SUSE-SU-2019:14051-1

Source
https://www.suse.com/support/update/announcement/2019/suse-su-201914051-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2019:14051-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2019:14051-1
Related
Published
2019-05-16T13:04:49Z
Modified
2019-05-16T13:04:49Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

  • CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
  • CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
  • CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
  • CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.

For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736

The following security bugs were fixed:

  • CVE-2019-9213: The expand_downwards function in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
  • CVE-2013-0216: The Xen netback functionality allowed guest OS users to cause a denial of service (loop) by triggering ring pointer corruption (bnc#800280).
  • CVE-2013-0231: The pcibackenablemsi function in the PCI backend driver (drivers/xen/pciback/confspacecapability_msi.c) in Xen allowed guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. (bnc#801178).
  • CVE-2012-3430: The rds_recvmsg function in net/rds/recv.c did not initialize a certain structure member, which allowed local users to obtain potentially sensitive information from kernel stack memory via a recvfrom or recvmsg system call on an RDS socket (bnc#773383).
  • CVE-2012-3412: The sfc (aka Solarflare Solarstorm) driver allowed remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value (bnc#774523).
  • CVE-2013-0160: The kernel allowed local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device (bnc#797175).
  • CVE-2013-1979: The scmsetcred function in include/net/scm.h uses incorrect uid and gid values during credentials passing, which allowed local users to gain privileges via a crafted application (bnc#816708).

The following non-security bugs were fixed:

  • Add opcodes from net: filter: BPF 'JIT' compiler for PPC64 (bsc#1131107).
  • EHCI: improved logic for isochronous scheduling (bsc#1117515).
  • KVM: x86: Use jmp to invoke kvmspuriousfault() from .fixup (bsc#1129439).
  • USB: Add new USB LPM helpers (bsc#1129770).
  • USB: Consolidate LPM checks to avoid enabling LPM twice (bsc#1129770).
  • USB: EHCI: add new root-hub state: STOPPING (bsc#1117515).
  • USB: EHCI: add pointer to end of async-unlink list (bsc#1117515).
  • USB: EHCI: add symbolic constants for QHs (bsc#1117515).
  • USB: EHCI: always scan each interrupt QH (bsc#1117515).
  • USB: EHCI: do not lose events during a scan (bsc#1117515).
  • USB: EHCI: do not refcount QHs (bsc#1117515).
  • USB: EHCI: do not refcount iso_stream structures (bsc#1117515).
  • USB: EHCI: fix initialization bug in isostreamschedule() (bsc#1117515).
  • USB: EHCI: fix up locking (bsc#1117515).
  • USB: EHCI: initialize data before resetting hardware (bsc#1117515).
  • USB: EHCI: introduce high-res timer (bsc#1117515).
  • USB: EHCI: remove PS3 status polling (bsc#1117515).
  • USB: EHCI: remove unneeded suspend/resume code (bsc#1117515).
  • USB: EHCI: rename 'reclaim' (bsc#1117515).
  • USB: EHCI: resolve some unlikely races (bsc#1117515).
  • USB: EHCI: return void instead of 0 (bsc#1117515).
  • USB: EHCI: simplify isochronous scanning (bsc#1117515).
  • USB: EHCI: unlink multiple async QHs together (bsc#1117515).
  • USB: EHCI: use hrtimer for (s)iTD deallocation (bsc#1117515).
  • USB: EHCI: use hrtimer for async schedule (bsc#1117515).
  • USB: EHCI: use hrtimer for controller death (bsc#1117515).
  • USB: EHCI: use hrtimer for interrupt QH unlink (bsc#1117515).
  • USB: EHCI: use hrtimer for the I/O watchdog (bsc#1117515).
  • USB: EHCI: use hrtimer for the IAA watchdog (bsc#1117515).
  • USB: EHCI: use hrtimer for the periodic schedule (bsc#1117515).
  • USB: EHCI: use hrtimer for unlinking empty async QHs (bsc#1117515).
  • copymountstring: Limit string length to PATH_MAX (bsc#1082943).
  • cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
  • drm: Fix error handling in drmlegacyaddctx (bsc#1106886)
  • ext3: Set bitmap tails when growing filesystem (bsc#1128383).
  • fbdev: chipsfb: remove set but not used variable 'size' (bsc#1106886)
  • iommu/vt-d: Check capability before disabling protected memory (bsc#1130353).
  • iommu/vt-d: Check identity map for hot-added devices (bsc#1129248).
  • kernel/watchdog.c: control hard lockup detection default (bsc#1110436).
  • kvm: ensure hard lockup detection is disabled by default (bsc#1110436).
  • kvm: vmx: Set IA32TSCAUX for legacy mode guests (bsc#1129437).
  • kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
  • mm, oom: fix use-after-free in oomkillprocess (git fixes (mm/mmap)).
  • mpt2sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bsc#1130384).
  • nfsd: fix memory corruption caused by readdir (bsc#1127445).
  • powerpc/64: Call setupbarriernospec() from setup_arch() (bsc#1131107).
  • powerpc/64: Disable the speculation barrier from the command line (bsc#1131107).
  • powerpc/64: Make stf barrier PPCBOOK3S64 specific (bsc#1131107).
  • powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).
  • powerpc/64s: Add support for software count cache flush (bsc#1131107).
  • powerpc/asm: Add a patch_site macro & helpers for patching instructions (bsc#1131107).
  • powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).
  • powerpc/pseries/mce: Fix misleading print for TLB mutlihit (bsc#1094244, git-fixes).
  • powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).
  • powerpc/security: Fix spectre_v2 reporting (bsc#1131107).
  • powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
  • powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
  • powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
  • s390/dasd: fix panic for failed online processing (bsc#1132589).
  • s390/qeth: cancel close_dev work before removing a card (LTC#175048, bsc#1127376).
  • s390/qeth: fix use-after-free in error path (LTC#175048, bsc#1127376, bsc#1127534).
  • s390/qeth: handle failure on workqueue creation (LTC#175048, bsc#1127376).
  • s390/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
  • sched/core: Optimize SCHED_SMT (bsc#1111331).
  • sched/smt: Expose schedsmtpresent static key (bsc#1111331).
  • sched/smt: Make schedsmtpresent track topology (bsc#1111331).
  • sched/smt: Update schedsmtpresent at runtime (bsc#1111331).
  • scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
  • scsi: qla2xxx: do not disable a not previously enabled PCI device (bsc#1127738).
  • x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
  • x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).
  • x86/speculation/mds: Add 'mitigations=' support for MDS (bsc#1111331).
  • x86/speculation/mds: Add BUGMSBDSONLY (bsc#1111331).
  • x86/speculation/mds: Add SMT warning message (bsc#1111331).
  • x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).
  • x86/speculation/mds: Add mds=full,nosmt cmdline option (bsc#1111331).
  • x86/speculation/mds: Add mdsclearcpu_buffers() (bsc#1111331).
  • x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).
  • x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).
  • x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).
  • x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).
  • x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).
  • x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (bsc#1111331).
  • x86/speculation: Consolidate CPU whitelists (bsc#1111331).
  • x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1111331).
  • x86/speculation: Move archsmtupdate() call to after mitigation decisions (bsc#1111331).
  • x86/speculation: Rework SMT state change (bsc#1111331).
  • x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
References

Affected packages

SUSE:Linux Enterprise Server 11 SP4-LTSS / kernel-bigmem

Package

Name
kernel-bigmem
Purl
purl:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-108.90.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-108.90.1",
            "kernel-default-man": "3.0.101-108.90.1",
            "kernel-ec2": "3.0.101-108.90.1",
            "kernel-default": "3.0.101-108.90.1",
            "kernel-source": "3.0.101-108.90.1",
            "kernel-bigmem": "3.0.101-108.90.1",
            "kernel-pae-base": "3.0.101-108.90.1",
            "kernel-syms": "3.0.101-108.90.1",
            "kernel-bigmem-base": "3.0.101-108.90.1",
            "kernel-pae": "3.0.101-108.90.1",
            "kernel-ppc64-devel": "3.0.101-108.90.1",
            "kernel-ec2-devel": "3.0.101-108.90.1",
            "kernel-ppc64-base": "3.0.101-108.90.1",
            "kernel-trace-devel": "3.0.101-108.90.1",
            "kernel-trace": "3.0.101-108.90.1",
            "kernel-ec2-base": "3.0.101-108.90.1",
            "kernel-ppc64": "3.0.101-108.90.1",
            "kernel-xen-base": "3.0.101-108.90.1",
            "kernel-xen-devel": "3.0.101-108.90.1",
            "kernel-bigmem-devel": "3.0.101-108.90.1",
            "kernel-trace-base": "3.0.101-108.90.1",
            "kernel-default-devel": "3.0.101-108.90.1",
            "kernel-pae-devel": "3.0.101-108.90.1",
            "kernel-xen": "3.0.101-108.90.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4-LTSS / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-108.90.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-108.90.1",
            "kernel-default-man": "3.0.101-108.90.1",
            "kernel-ec2": "3.0.101-108.90.1",
            "kernel-default": "3.0.101-108.90.1",
            "kernel-source": "3.0.101-108.90.1",
            "kernel-bigmem": "3.0.101-108.90.1",
            "kernel-pae-base": "3.0.101-108.90.1",
            "kernel-syms": "3.0.101-108.90.1",
            "kernel-bigmem-base": "3.0.101-108.90.1",
            "kernel-pae": "3.0.101-108.90.1",
            "kernel-ppc64-devel": "3.0.101-108.90.1",
            "kernel-ec2-devel": "3.0.101-108.90.1",
            "kernel-ppc64-base": "3.0.101-108.90.1",
            "kernel-trace-devel": "3.0.101-108.90.1",
            "kernel-trace": "3.0.101-108.90.1",
            "kernel-ec2-base": "3.0.101-108.90.1",
            "kernel-ppc64": "3.0.101-108.90.1",
            "kernel-xen-base": "3.0.101-108.90.1",
            "kernel-xen-devel": "3.0.101-108.90.1",
            "kernel-bigmem-devel": "3.0.101-108.90.1",
            "kernel-trace-base": "3.0.101-108.90.1",
            "kernel-default-devel": "3.0.101-108.90.1",
            "kernel-pae-devel": "3.0.101-108.90.1",
            "kernel-xen": "3.0.101-108.90.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4-LTSS / kernel-ec2

Package

Name
kernel-ec2
Purl
purl:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-108.90.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-108.90.1",
            "kernel-default-man": "3.0.101-108.90.1",
            "kernel-ec2": "3.0.101-108.90.1",
            "kernel-default": "3.0.101-108.90.1",
            "kernel-source": "3.0.101-108.90.1",
            "kernel-bigmem": "3.0.101-108.90.1",
            "kernel-pae-base": "3.0.101-108.90.1",
            "kernel-syms": "3.0.101-108.90.1",
            "kernel-bigmem-base": "3.0.101-108.90.1",
            "kernel-pae": "3.0.101-108.90.1",
            "kernel-ppc64-devel": "3.0.101-108.90.1",
            "kernel-ec2-devel": "3.0.101-108.90.1",
            "kernel-ppc64-base": "3.0.101-108.90.1",
            "kernel-trace-devel": "3.0.101-108.90.1",
            "kernel-trace": "3.0.101-108.90.1",
            "kernel-ec2-base": "3.0.101-108.90.1",
            "kernel-ppc64": "3.0.101-108.90.1",
            "kernel-xen-base": "3.0.101-108.90.1",
            "kernel-xen-devel": "3.0.101-108.90.1",
            "kernel-bigmem-devel": "3.0.101-108.90.1",
            "kernel-trace-base": "3.0.101-108.90.1",
            "kernel-default-devel": "3.0.101-108.90.1",
            "kernel-pae-devel": "3.0.101-108.90.1",
            "kernel-xen": "3.0.101-108.90.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4-LTSS / kernel-pae

Package

Name
kernel-pae
Purl
purl:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-108.90.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-108.90.1",
            "kernel-default-man": "3.0.101-108.90.1",
            "kernel-ec2": "3.0.101-108.90.1",
            "kernel-default": "3.0.101-108.90.1",
            "kernel-source": "3.0.101-108.90.1",
            "kernel-bigmem": "3.0.101-108.90.1",
            "kernel-pae-base": "3.0.101-108.90.1",
            "kernel-syms": "3.0.101-108.90.1",
            "kernel-bigmem-base": "3.0.101-108.90.1",
            "kernel-pae": "3.0.101-108.90.1",
            "kernel-ppc64-devel": "3.0.101-108.90.1",
            "kernel-ec2-devel": "3.0.101-108.90.1",
            "kernel-ppc64-base": "3.0.101-108.90.1",
            "kernel-trace-devel": "3.0.101-108.90.1",
            "kernel-trace": "3.0.101-108.90.1",
            "kernel-ec2-base": "3.0.101-108.90.1",
            "kernel-ppc64": "3.0.101-108.90.1",
            "kernel-xen-base": "3.0.101-108.90.1",
            "kernel-xen-devel": "3.0.101-108.90.1",
            "kernel-bigmem-devel": "3.0.101-108.90.1",
            "kernel-trace-base": "3.0.101-108.90.1",
            "kernel-default-devel": "3.0.101-108.90.1",
            "kernel-pae-devel": "3.0.101-108.90.1",
            "kernel-xen": "3.0.101-108.90.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4-LTSS / kernel-ppc64

Package

Name
kernel-ppc64
Purl
purl:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-108.90.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-108.90.1",
            "kernel-default-man": "3.0.101-108.90.1",
            "kernel-ec2": "3.0.101-108.90.1",
            "kernel-default": "3.0.101-108.90.1",
            "kernel-source": "3.0.101-108.90.1",
            "kernel-bigmem": "3.0.101-108.90.1",
            "kernel-pae-base": "3.0.101-108.90.1",
            "kernel-syms": "3.0.101-108.90.1",
            "kernel-bigmem-base": "3.0.101-108.90.1",
            "kernel-pae": "3.0.101-108.90.1",
            "kernel-ppc64-devel": "3.0.101-108.90.1",
            "kernel-ec2-devel": "3.0.101-108.90.1",
            "kernel-ppc64-base": "3.0.101-108.90.1",
            "kernel-trace-devel": "3.0.101-108.90.1",
            "kernel-trace": "3.0.101-108.90.1",
            "kernel-ec2-base": "3.0.101-108.90.1",
            "kernel-ppc64": "3.0.101-108.90.1",
            "kernel-xen-base": "3.0.101-108.90.1",
            "kernel-xen-devel": "3.0.101-108.90.1",
            "kernel-bigmem-devel": "3.0.101-108.90.1",
            "kernel-trace-base": "3.0.101-108.90.1",
            "kernel-default-devel": "3.0.101-108.90.1",
            "kernel-pae-devel": "3.0.101-108.90.1",
            "kernel-xen": "3.0.101-108.90.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4-LTSS / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-108.90.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-108.90.1",
            "kernel-default-man": "3.0.101-108.90.1",
            "kernel-ec2": "3.0.101-108.90.1",
            "kernel-default": "3.0.101-108.90.1",
            "kernel-source": "3.0.101-108.90.1",
            "kernel-bigmem": "3.0.101-108.90.1",
            "kernel-pae-base": "3.0.101-108.90.1",
            "kernel-syms": "3.0.101-108.90.1",
            "kernel-bigmem-base": "3.0.101-108.90.1",
            "kernel-pae": "3.0.101-108.90.1",
            "kernel-ppc64-devel": "3.0.101-108.90.1",
            "kernel-ec2-devel": "3.0.101-108.90.1",
            "kernel-ppc64-base": "3.0.101-108.90.1",
            "kernel-trace-devel": "3.0.101-108.90.1",
            "kernel-trace": "3.0.101-108.90.1",
            "kernel-ec2-base": "3.0.101-108.90.1",
            "kernel-ppc64": "3.0.101-108.90.1",
            "kernel-xen-base": "3.0.101-108.90.1",
            "kernel-xen-devel": "3.0.101-108.90.1",
            "kernel-bigmem-devel": "3.0.101-108.90.1",
            "kernel-trace-base": "3.0.101-108.90.1",
            "kernel-default-devel": "3.0.101-108.90.1",
            "kernel-pae-devel": "3.0.101-108.90.1",
            "kernel-xen": "3.0.101-108.90.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4-LTSS / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-108.90.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-108.90.1",
            "kernel-default-man": "3.0.101-108.90.1",
            "kernel-ec2": "3.0.101-108.90.1",
            "kernel-default": "3.0.101-108.90.1",
            "kernel-source": "3.0.101-108.90.1",
            "kernel-bigmem": "3.0.101-108.90.1",
            "kernel-pae-base": "3.0.101-108.90.1",
            "kernel-syms": "3.0.101-108.90.1",
            "kernel-bigmem-base": "3.0.101-108.90.1",
            "kernel-pae": "3.0.101-108.90.1",
            "kernel-ppc64-devel": "3.0.101-108.90.1",
            "kernel-ec2-devel": "3.0.101-108.90.1",
            "kernel-ppc64-base": "3.0.101-108.90.1",
            "kernel-trace-devel": "3.0.101-108.90.1",
            "kernel-trace": "3.0.101-108.90.1",
            "kernel-ec2-base": "3.0.101-108.90.1",
            "kernel-ppc64": "3.0.101-108.90.1",
            "kernel-xen-base": "3.0.101-108.90.1",
            "kernel-xen-devel": "3.0.101-108.90.1",
            "kernel-bigmem-devel": "3.0.101-108.90.1",
            "kernel-trace-base": "3.0.101-108.90.1",
            "kernel-default-devel": "3.0.101-108.90.1",
            "kernel-pae-devel": "3.0.101-108.90.1",
            "kernel-xen": "3.0.101-108.90.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4-LTSS / kernel-trace

Package

Name
kernel-trace
Purl
purl:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-108.90.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-108.90.1",
            "kernel-default-man": "3.0.101-108.90.1",
            "kernel-ec2": "3.0.101-108.90.1",
            "kernel-default": "3.0.101-108.90.1",
            "kernel-source": "3.0.101-108.90.1",
            "kernel-bigmem": "3.0.101-108.90.1",
            "kernel-pae-base": "3.0.101-108.90.1",
            "kernel-syms": "3.0.101-108.90.1",
            "kernel-bigmem-base": "3.0.101-108.90.1",
            "kernel-pae": "3.0.101-108.90.1",
            "kernel-ppc64-devel": "3.0.101-108.90.1",
            "kernel-ec2-devel": "3.0.101-108.90.1",
            "kernel-ppc64-base": "3.0.101-108.90.1",
            "kernel-trace-devel": "3.0.101-108.90.1",
            "kernel-trace": "3.0.101-108.90.1",
            "kernel-ec2-base": "3.0.101-108.90.1",
            "kernel-ppc64": "3.0.101-108.90.1",
            "kernel-xen-base": "3.0.101-108.90.1",
            "kernel-xen-devel": "3.0.101-108.90.1",
            "kernel-bigmem-devel": "3.0.101-108.90.1",
            "kernel-trace-base": "3.0.101-108.90.1",
            "kernel-default-devel": "3.0.101-108.90.1",
            "kernel-pae-devel": "3.0.101-108.90.1",
            "kernel-xen": "3.0.101-108.90.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4-LTSS / kernel-xen

Package

Name
kernel-xen
Purl
purl:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.101-108.90.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-base": "3.0.101-108.90.1",
            "kernel-default-man": "3.0.101-108.90.1",
            "kernel-ec2": "3.0.101-108.90.1",
            "kernel-default": "3.0.101-108.90.1",
            "kernel-source": "3.0.101-108.90.1",
            "kernel-bigmem": "3.0.101-108.90.1",
            "kernel-pae-base": "3.0.101-108.90.1",
            "kernel-syms": "3.0.101-108.90.1",
            "kernel-bigmem-base": "3.0.101-108.90.1",
            "kernel-pae": "3.0.101-108.90.1",
            "kernel-ppc64-devel": "3.0.101-108.90.1",
            "kernel-ec2-devel": "3.0.101-108.90.1",
            "kernel-ppc64-base": "3.0.101-108.90.1",
            "kernel-trace-devel": "3.0.101-108.90.1",
            "kernel-trace": "3.0.101-108.90.1",
            "kernel-ec2-base": "3.0.101-108.90.1",
            "kernel-ppc64": "3.0.101-108.90.1",
            "kernel-xen-base": "3.0.101-108.90.1",
            "kernel-xen-devel": "3.0.101-108.90.1",
            "kernel-bigmem-devel": "3.0.101-108.90.1",
            "kernel-trace-base": "3.0.101-108.90.1",
            "kernel-default-devel": "3.0.101-108.90.1",
            "kernel-pae-devel": "3.0.101-108.90.1",
            "kernel-xen": "3.0.101-108.90.1"
        }
    ]
}