Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-1577 (GCVE-0-2011-1577)
Vulnerability from cvelistv5 – Published: 2011-05-03 19:00 – Updated: 2024-08-06 22:28- n/a
| URL | Tags |
|---|---|
| https://exchange.xforce.ibmcloud.com/vulnerabilit… | vdb-entryx_refsource_XF |
| http://securitytracker.com/id?1025355 | vdb-entryx_refsource_SECTRACK |
| https://bugzilla.redhat.com/show_bug.cgi?id=695976 | x_refsource_CONFIRM |
| http://openwall.com/lists/oss-security/2011/04/13/1 | mailing-listx_refsource_MLIST |
| http://www.securityfocus.com/bid/47343 | vdb-entryx_refsource_BID |
| http://rhn.redhat.com/errata/RHSA-2011-0833.html | vendor-advisoryx_refsource_REDHAT |
| http://lists.fedoraproject.org/pipermail/package-… | vendor-advisoryx_refsource_FEDORA |
| http://securityreason.com/securityalert/8238 | third-party-advisoryx_refsource_SREASON |
| http://www.securityfocus.com/archive/1/517477/100… | mailing-listx_refsource_BUGTRAQ |
| http://www.spinics.net/lists/mm-commits/msg83274.html | mailing-listx_refsource_MLIST |
| http://downloads.avaya.com/css/P8/documents/100145416 | x_refsource_CONFIRM |
| http://openwall.com/lists/oss-security/2011/04/12/17 | mailing-listx_refsource_MLIST |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:28:41.821Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "kernel-guid-dos(66773)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66773"
},
{
"name": "1025355",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1025355"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"name": "[oss-security] 20110413 Re: CVE Request: kernel: fs/partitions: Corrupted GUID partition tables can cause kernel oops",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/04/13/1"
},
{
"name": "47343",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/47343"
},
{
"name": "RHSA-2011:0833",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"name": "FEDORA-2011-7823",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html"
},
{
"name": "8238",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/8238"
},
{
"name": "20110413 [PRE-SA-2011-03] Denial-of-service vulnerability in EFI partition handling code of the Linux kernel",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/517477/100/0/threaded"
},
{
"name": "[mm-commits] 20110412 + fs-partitions-efic-corrupted-guid-partition-tables-can-cause-kernel-oops.patch added to -mm tree",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.spinics.net/lists/mm-commits/msg83274.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"name": "[oss-security] 20110412 CVE Request: kernel: fs/partitions: Corrupted GUID partition tables can cause kernel oops",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2011/04/12/17"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-04-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "kernel-guid-dos(66773)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66773"
},
{
"name": "1025355",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1025355"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"name": "[oss-security] 20110413 Re: CVE Request: kernel: fs/partitions: Corrupted GUID partition tables can cause kernel oops",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/04/13/1"
},
{
"name": "47343",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/47343"
},
{
"name": "RHSA-2011:0833",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"name": "FEDORA-2011-7823",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html"
},
{
"name": "8238",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/8238"
},
{
"name": "20110413 [PRE-SA-2011-03] Denial-of-service vulnerability in EFI partition handling code of the Linux kernel",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/517477/100/0/threaded"
},
{
"name": "[mm-commits] 20110412 + fs-partitions-efic-corrupted-guid-partition-tables-can-cause-kernel-oops.patch added to -mm tree",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.spinics.net/lists/mm-commits/msg83274.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"name": "[oss-security] 20110412 CVE Request: kernel: fs/partitions: Corrupted GUID partition tables can cause kernel oops",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2011/04/12/17"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-1577",
"datePublished": "2011-05-03T19:00:00.000Z",
"dateReserved": "2011-04-05T00:00:00.000Z",
"dateUpdated": "2024-08-06T22:28:41.821Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2011-1577",
"date": "2026-05-24",
"epss": "0.00073",
"percentile": "0.2207"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.6.38\", \"matchCriteriaId\": \"F68ABAD0-43FB-4476-A98D-CD8A403D495F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"142BCD48-8387-4D0C-A052-44DD4144CBFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8220D81-9065-471F-9256-CFE7B9941555\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C14A949-E2B8-4100-8ED4-645CB996B08A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"81941077-0011-4272-A8C7-21D0AFE7DECB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB445E3E-CCBD-4737-BE30-841B9A79D558\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B2EDDD7-5B3E-45AA-BC42-A6FF516B8F57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"02F89C7A-24F2-4518-A605-78A5B7056A1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C43BA02-0686-42F0-B901-4CB88459E2D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5301E27-8021-467C-A9A2-AF2137EF0299\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"59393187-1D1E-45CD-BE0E-385F978E4834\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0CCDF6B-0365-4553-B161-3F6D68A58F72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9B2BB71-0489-40F6-9CB6-A95B96E92106\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"842ECCE2-60F0-41C0-9EAA-A43AF97F61AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79787868-2D77-4B55-AD61-C2B357CCE047\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"05F0391C-D4CC-4652-A24C-DC47F4C3DC91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"56340FF9-EE77-4EB3-9720-240FAAEF39F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"79EB0E94-6AE8-4703-96BD-B927E0F2893F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A1F1242-0F07-4D81-9175-3BA5B2C7B564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ECBCF2E-95B3-4BE9-9B93-6390AB578C7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CF4EC75-06A2-4BD4-A39A-183F00C46E11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0934C49-5F88-4189-BD88-2F32C39C2F25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFC3618C-FBE8-4F7C-BECE-F2CDDF785599\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6501752-2595-4412-9140-C78EB9FD41CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"14B0A230-4054-4483-A3A7-9A5A286C7552\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D78F881-DB3A-423A-8DAD-314645B2B3EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D77D4CC4-7008-4E6F-A8CA-62DA244BB3AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F90242EF-048B-4539-AA41-87AA84875A9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C4E9325-2A70-4E15-9AAF-5588BF218055\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"01402A85-B681-4DE0-B7BB-F52567DA29E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"70D1E088-5A9B-4CBF-A4FF-969201942CCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"455E647F-73DD-400A-AA19-3D93FE2E57AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC106BDA-2EA4-41A2-AA01-6352A5C255B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB515243-7519-4CA4-9267-D9A6798CBC49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B672E1B6-E8E9-473F-853F-906EA56D712E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F727CD3-D3C2-4648-9EC5-092DF3F73B13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B130EB7-A951-4717-A906-E2F602F7B69F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1765065-ABE5-478C-9ACC-EFFA8E4A7043\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D90502F-EC45-4ADC-9428-B94346DA660B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8DE0233-BE28-4C0A-B9FB-2157F41F8D4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2422569B-02ED-4028-83D8-D778657596B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E66E4653-1A55-4827-888B-E0776E32ED28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C8994CB-7F94-43FB-8B84-06AEBB34EAE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"95DD4647-564E-4067-A945-F52232C0A33A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81DE32C2-5B07-4812-9F88-000F5FB000C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7936B7EE-9CD1-4698-AD67-C619D0171A88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5738D628-0B2D-4F56-9427-2009BFCB6C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"169446DE-67F8-4738-91FE-ED8058118F80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F76C298-81DC-43E4-8FC9-DC005A2116EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AB349B2-3F78-4197-882B-90ADB3BF645A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AC88830-A9BC-4607-B572-A4B502FC9FD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"476CB3A5-D022-4F13-AAEF-CB6A5785516A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CFD5CDD-1709-44C7-82BD-BAFDC46990D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"860F9225-8A3F-492C-B72B-5EFFB322802C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E23724-2CA4-4211-BB83-38661BE7E6AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"93F0834D-C5EA-4C96-8D6C-3123ECF78F8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1784CBC-BEAF-48E5-95A4-2A4BD5F9F1BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"31523E67-5E4F-43F7-9410-20CB3F287DAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D9F976B-1328-40FE-A1F2-C1DF3F836604\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B627DE3-2702-4EB2-9733-253D315FB594\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"10E1B011-8D20-448E-9DD5-023DD30D1FE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A29A4BC-0442-458E-A874-BF0D0F2870FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"298266AB-2A36-4606-BF80-2185FC56C4D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C2658CA-56C2-494F-AC42-618EC413CBDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD34526D-F2CC-44C5-991D-B1E41C327860\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"04F25DE0-CA8E-4F57-87A5-C30D89CC9E44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F87F764B-4097-44FA-B96E-A5DA75E31F7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7025803-C679-44DB-ADEE-864E6CAAD9B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"24B879D6-4631-49A8-9366-75577DFB755D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5B76C21-70C8-4911-A24B-270F876EF7C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25379B32-D898-4E44-A740-978A129B5E05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B90F8F2-9549-413D-9676-3EF634D832B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"585BEE46-088A-494E-8E18-03F33F6BBEA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFF35478-B292-4A00-B985-CEEDE8B212C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7344B707-6145-48BA-8BC9-9B140A260BCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"390B1E09-7014-4A74-834C-806BBEBAF6F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEF02479-2124-4655-A38D-A4793D3B8A1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FB5CF04-B5B6-4DFB-B051-61EDA257019F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"A89DC9CD-C06F-4B9B-B376-900E65016296\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"15BED7A7-3E96-43EF-8B6F-3C94897C3AA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C6FCAC4-B6C6-4125-B3AC-F30407AA7738\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"707ECC75-65B6-4B02-BE85-A4804549A2DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B753112-CCDE-4870-AA97-4AAA2946421A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79B3AFE7-F4FF-4144-9046-E5926E305A03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7616E197-ACCA-4191-A513-FD48417C7F88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EE2F94D-E8E0-4BB7-A910-378012580025\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66F5AE3B-B701-4579-B44A-0F7A4267852E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1369C4A-EF3B-4805-9046-ADA38ED940C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC3639E1-B5E4-4DD6-80D4-BA07D192C42D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"54393D69-B368-4296-9798-D81570495C6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6791A801-9E06-47DD-912F-D8594E2F6B3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE90CCED-3A5B-46E3-A6B0-4865AB786289\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E452E4-45A9-4469-BF69-F40B6598F0EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48777A01-8F36-4752-8F7A-1D1686C69A33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"747F1324-AEFA-496F-9447-12CD13114F60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"795C3B17-687E-4F33-AA99-8FEC16F14693\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"900D6742-DE0F-45C5-A812-BF84088CB02A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D88ED3C4-64C5-44B2-9F23-E16087046C40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03FB31E5-190C-489A-AB30-910D2CC854F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6316369-B54A-4E59-A022-E0610353B284\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"073C3CE0-E12D-4545-8460-5A1514271D50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83700989-8820-48DA-A9FE-6A77DF1E8439\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC9F4CEC-7781-468B-B460-4F487B7C6601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67C75A62-8807-4821-9362-1E0D63C0A1B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9960640-F02D-4E81-A34B-1893D8FD7F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C398D26-7132-4A6E-9003-77246644451B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B21D90E-5172-485E-87AC-F1681604AD7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"641EECFD-A985-4026-A53A-10FBE47EAD91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47595F81-2083-4236-A0B0-E2B98DD78402\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F5FC758-5A5D-466A-8386-5FC469F79F66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12547B6B-78F1-4426-81CE-5F208794658C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38429E64-276B-46D4-AACD-05349D6F6615\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E89640F8-313B-4A36-A591-36645D1EF838\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04B42F06-AC6D-40F3-BC03-5126BED48F36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A8002C7-19E2-4F20-890E-4BA2029174D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34FC90C2-AED0-4EAF-B5E8-DE75961DA26E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7DA9C54-742C-4057-8BAB-18755B4A42D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53037B40-D534-41D1-9895-8EDB0D884C3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5549096F-C640-463E-AD07-FD8D254CC098\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8DCAF19-879C-42BB-B56A-84504E79758A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E86E13B-EC92-47F3-94A9-DB515313011D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"980A6C7D-6175-4A44-8377-74AA7A9FD108\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C226902-04D9-4F32-866C-20225841ECF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"655DB612-AF49-4C17-AFB9-2E33EE8E0572\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1F65DF2-2794-47B7-9676-CCF150683CC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56C6C01B-4CED-4F37-A415-0603496C27DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC47887B-5608-47BE-85EE-563864461915\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"809264F1-763D-4A8F-B206-222332DD8732\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A66ED53E-3139-4972-B027-D614BFFB8628\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85A3AB7A-1959-4A57-B83D-B2753C43649E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A60B265-5508-4EE0-980A-44BB0966FD7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C06F0037-DE20-4B4A-977F-BFCFAB026517\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1817C772-D367-4ABE-B835-466D31A6DC89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9484B41A-DFB6-4481-80D8-440C711CEA53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2975DF7-F916-456C-BF7C-2694559E5282\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"338BB401-8831-4094-9186-2B3CFA5903D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"189D1246-F975-4411-A58B-343ED90485FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"179147E4-5247-451D-9409-545D661BC158\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D97ED16-D6B7-4445-889C-4D6DE2EDC49A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFFB2843-A867-48EC-97D7-B106C7BBAED0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CD3FE23-1A10-47E6-AD7E-D67F1BE3C5E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F39FC76-7D77-4064-94D3-A16C436FA8D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EC547EB-9308-4477-8256-A0E04B42D6DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6940324-0383-4510-BA55-770E0A6B80B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"228657B0-0CDF-4D02-B2CD-0C43063BF51E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB1E1A8B-6FA1-45AD-B034-EC34884527DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2684C91-2291-4144-B482-E7816C2A3CD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"91B1D523-89F6-4010-9F8D-430083131730\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"15039537-3667-4F88-84AF-7526C2625571\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"99071C5B-0D2B-401E-B924-D0C64F66B048\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5330C89-3C98-4003-A989-A232B30BBDBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E3313D5-52E8-49B3-B145-170D9A26DA43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"480F035A-A59D-4113-A246-DF108BB2F591\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30D39E29-B2A0-4075-84AF-994C27AB0A68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19879317-B067-45DA-B497-21EBDDDC2521\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D220C745-28AD-4D04-B2D2-A090D229206E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4AF8895-7BF8-458E-B2BB-68699AABC023\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF495E58-DA6C-402D-B381-4929CB8A502B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A591301C-C30F-44AC-90F0-709A18AA96E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"610A93BB-70E3-4BF1-83E8-8A7388477F44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"821BD11F-3C6A-4424-BC9B-DFD786248B07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F55A024-9F8E-44F8-A0D8-696BC232524A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50B422D1-6C6E-4359-A169-3EED78A1CF40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"08A6E33E-5847-45DA-B9C9-79A7C5C877D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1F60C33-3CEA-45F0-97FA-18C029270190\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"247E13CB-9B11-4B64-80AD-C0F8482CCC0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"903FE5D3-A9FB-466D-833B-448233BB0803\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"958EDC43-0848-4D93-9D07-6A085A5940B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD35F21D-0A28-4C14-BCF5-8EDA760701C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AAD8BE9-A05B-40E8-80DF-0B2878968BD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB759752-DC19-4750-838B-056063EFDC5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99662904-E5E3-4E81-B199-39707EAEB652\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"615BDD1D-36AA-4976-909B-F0F66BF1090C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AAA75FD-FBF0-4D0D-9485-9CC19559DD66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"053D359F-F2DA-47DB-9DD1-B49811DFF620\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"39CBD1BA-B8A9-404D-9E94-5E643EE313CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6465E61D-0238-4ED3-B4CB-E3B93F4F324F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"830B8340-2B8F-4F0A-8943-F4413411573C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"D123AAFE-3F17-45C4-9382-BA392FD022C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0C256E6-2691-4478-A51C-DE580A717AB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B179CF1D-084D-4B21-956F-E55AC6BDE026\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"432CA976-6EFA-4D34-B5EA-CD772D067F93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E476195-657E-416E-BC16-44A18B06A133\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70460F6C-D6C0-4C1A-B13E-368705EAF223\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EBFF148-3EDA-4216-910B-8930D8C443C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFF566DA-0F04-48DA-AA40-565979C55328\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5990C6C2-2F66-4C4D-8224-74163865F410\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C23AD176-3B99-4593-BCBD-13C1E579A13E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"034DFD7F-8919-4245-8480-7B272F591271\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CEBC606-6488-48CE-8AA8-5B8CC724D5D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A83C60AF-50A9-480E-860D-45E80AC0A6B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D42BA44-C69B-4170-9867-CABF93CA9BD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6BCD075-9FCE-496C-9807-3A13998129B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"460BC48C-1598-4739-A64B-A2350BC6BD28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"7700AB42-8543-4FA5-9BAF-EF2F126E9375\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8C31F2D-385F-46CF-8F04-61157EE35013\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"3588EB36-674F-49FB-A51C-0B52F8BFD9D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C93A9E4-08DA-44D2-B6D9-76BD287FA5DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23:rc9:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5575728-D466-4CC9-95BA-8CA433D19566\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5140380C-71BD-464F-AE53-1814C2653056\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B18EC0A7-8616-4039-B98B-E1216E035B05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22FB141B-FA2A-435D-8937-83FC0669CB20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23FC6CE2-8717-4558-A309-A441D322F00E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"311BE336-7BB2-47C0-AED5-3DEA706C206F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AAC2E9D-0E82-4866-9046-ADD448418198\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80F9887E-2466-4C73-A8E1-2117492F9EC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FDE5B27-2EF0-464E-8F14-5E809D84D389\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"815B2EE8-136F-44E4-997D-5F93A54775DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"085259B8-9D41-42B0-B32B-66B8D365F106\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A12DE15-E192-4B90-ADB7-A886B3746DD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF6588E7-F4FA-40F5-8945-FC7B6094376E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE87E13E-ACF7-4F74-8938-729F3B0D694C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4965A12-1BBA-4494-A5C1-43E0C0F48C14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7A18909-B468-4A5C-8DCC-2690F1F1D6C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEFCCCBD-B3EA-4A78-BEF9-6BD4793AAE10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8AF0C46-6BF2-46A3-8AD8-1E521E736169\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52152F5A-1833-4490-A373-9C547B90B0F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B64A095E-5E97-445E-B435-F09983CC0E7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EE92406-DBF3-463E-8A51-F9679E851FDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C60D19B-ED9B-443C-9D49-002ABD381119\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"264C61EE-64F6-43AD-B54F-7D683C29E64F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0149408A-30F6-4EDF-8B3B-CBAB884CE758\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71295664-89EC-4BB3-9F86-B1DDA20FAC5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC2C3D3E-3765-423F-B41B-35096E5154A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDCD92E0-2C08-429B-BB00-BAAB1B5FD79C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C19C7509-16AD-47C3-B984-A350D8F1C87B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"17593F6C-75DA-4936-8AC3-81631A715DD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6113F66-4F25-4302-9986-D75532F59E94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"00763CAF-AEF8-4EF1-9393-DEFF9697D382\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D5310FC-8432-4BBF-8174-60F7B8A608B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"4254F56E-6BA0-45DD-95D1-61A7C8AF7BA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25:rc9:*:*:*:*:*:*\", \"matchCriteriaId\": \"8957EE27-E19A-4DE6-B46D-FE413E88BD93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37BE853A-BA6F-4A70-B166-E34441F0B7DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85064FDF-4B62-43BF-B36C-F659D739BC22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEADC505-FF44-4D45-8EA6-B23A1C4564D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CE3C807-5C9B-4B71-868B-DF17ECB1514F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45B6847C-873B-4BE1-852D-239115E59BA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF41209E-D27F-4642-A405-90E822A41897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97F59FD9-46E5-4F63-80A0-091AD44D1867\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"428844A5-E020-4AE9-8012-9AEDFCB7C32E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94C9D70D-A552-48D6-9497-EE07EB5649D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF6169FF-9FF9-4A81-BAEB-6D5132F64F61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6DC79CF-A504-4232-9F66-B5DCD0213DA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"192B4273-0935-4232-BBFD-A850855CAC5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60E9FDA8-7EC3-4B9B-B508-27F948D60DDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A16F2182-C489-4CA9-A56B-01463148D16F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"630A56D3-7A82-44DE-8888-2EB8CD1C24A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E0D6431-E8E0-4079-A1A0-9CE6D1D67709\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF4EF7A7-6E96-43B4-8287-368098ABBFA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEF91995-A084-422A-A544-30B0B4D75E22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E45F4429-5A9C-4E8B-96EE-CCF19776CABF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA5634BC-FBAD-4B96-A88E-282E4F97A286\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"285DF725-52A0-4087-BC0D-32A0817CCB3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B2BB4B5-0553-4150-AE64-1E52865C5B79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"12D0C03A-7D30-485F-8431-638918FE9658\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B8E0DDC-7566-4EF9-9A8F-B1870CA83144\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"764777FB-FD1E-4930-899C-AC5D2DF293E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"95461D7E-A080-4B9E-BC72-6BDBC1C1A447\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"D913E879-38EC-46AE-9F20-5D3E5F2CDCC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26:rc9:*:*:*:*:*:*\", \"matchCriteriaId\": \"B264E869-1A6C-4D85-9944-2E4EB523CD82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EFCAF09-BB20-424C-8648-014C0F71F8A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A74970C-5EEA-47A7-A62D-AF98F4D1228F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEA56669-B09E-42C2-9591-245C46909A2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D08D180-23F7-456F-98CA-26B53C678D76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E3C363-49C9-4869-83B5-76C14100BFF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E1DE903-EDFC-4E0F-8EDF-7762FE3C7C80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC02BA18-9235-45CA-A3D6-0EB21CE69DEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"856FE78A-29B5-4411-98A0-4B0281C17EB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8B59FCD-8161-48EF-844D-8FA1AB2FAA76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DA311B8-D32E-4853-9B07-58EAF1019D0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0F0F679-43C8-426E-A97E-C3B207A3331C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAE6A7F3-3D04-4119-874D-DA2FA86B7BE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA40BC48-D6B5-4424-B306-F99E85EBBCB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C2DF2BB-F94A-4692-AFDC-47C42F04081B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB286B42-E739-46CD-BC96-972CFFAECB0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"7636014B-CC2A-43A3-9C9A-04B26AEB06D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4ED7CE5-3388-4CB9-AF60-A2AF19611327\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"324B5A3E-FA65-4F02-9B8F-872F38CD1808\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE21E2AE-9E01-471C-A419-6AB40A49C2F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADFC2D46-65D0-426F-9AF8-8C910AE91D49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11795F8E-7ACD-4597-9194-FC7241DCE057\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60F381E1-F3C5-49BE-B094-4D90E7B108F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D82A6217-CFA6-4E72-8BED-0297E13EABF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7954A701-1671-4080-B1E6-47E0208FD28C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63D06512-EAF0-48C6-98F0-066E63FF07EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F35DA6B-C6D4-47CC-97E7-9659DCFDD162\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D75B48F1-623A-4B96-9E08-4AA2DE748490\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E6EB7C3-D9AB-43E7-8B78-2C36AE920935\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FC87A28-C6A1-4E90-BD9F-A5BE1985DB50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0383E2A5-60EE-47F3-9DA8-BF75028D511F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8B0C229-2A79-47E0-856A-2AE0FF97B967\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB27B247-D6BF-49C4-B113-76C9A47B7DCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F94BA1B0-52B9-4303-9C41-3ACC3AC1945E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ACBB194-1D24-464A-B79C-44B8127EAD52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83E5F269-7711-447D-B798-0F5478E36299\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0138807-6313-4A3F-AB5A-4B7D4A9BE287\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4BA2227-F259-499D-BF50-5074B1E7DD3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78A896D0-032C-4467-9D57-E47E8C612704\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D1D4C8F-8C09-4A49-AFFD-33093AE7A437\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A415FECF-89CC-4D71-B1BF-6A678D32599D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98F77E54-5F4A-4D47-8DE8-097B4BBC7944\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"752148FC-1594-4108-AE0F-C5145B978454\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09546671-E75D-4F50-9D86-DFDDAC9DC5DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDC7A2D7-ACB4-4871-B7C0-02711A53DF1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6964925C-4394-4E82-976B-770A99E74F1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E8C909E-02D7-4B29-AA68-897BD0200B7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA036609-ADD3-4903-AB9D-E8BF81CFC776\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38F9E122-994B-4276-9FCF-A8E4D2D06D4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A15720C-3BDF-4343-B270-2575978293EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB5ADCFA-2CD8-4A00-AFEC-B84F7E0015A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EA2EE9B-27FD-49FE-8665-159DABA0E3C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C81C5F8-2224-4D84-B7C0-E18421276AFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B44A2C76-174E-40A5-9603-3B84D0D35557\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42ACE154-0709-4AA1-82E3-1B7F34E63187\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3022E902-9F0D-49FF-9279-71E0E1E8A873\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDF77B26-91FA-4245-BFEC-43FD021A28E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"601B4C93-9A9C-40E8-A9D0-DA9D71C745EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF7CE35A-87A4-4D95-86F9-211D50E30482\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEA8675A-A37C-4658-9D26-3359EBA277B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00E8CB86-ECEE-4435-BEFC-B8D209B2C5AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B373DEAE-8F8B-44AA-BAE5-3A0120A541F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D40063F-13D0-4897-AE71-1C7B617C8855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC7E89C8-CF89-4FA8-A9F1-F0B415E5FE10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.49:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4034EFE6-449D-4749-9265-B47D44AA4EC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F835D17-ACF9-4AE6-8C38-B74BE448B8B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21A12676-7EBE-4D83-83BD-D46CC7A1773A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FB112DB-891D-4FDB-8772-2E233A39A7BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B3A0794-B10C-4DFD-9CAD-202CA1DC9250\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76E86CE6-CD1C-4412-939F-B45867068D44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F6896A4-16E0-46B6-B90C-5C002C526478\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"469534AB-2D0F-4B31-8121-05A792FA9332\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.27.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2820354-F25B-485D-9FA7-E32B38DDBB1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26BD805F-08EB-42EC-BC54-26A7278E5089\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3463B83B-E46F-456E-98BA-801C59AEB337\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8A1A8F2-F892-4EDC-A5DA-1BBD6993E84E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"60EFBFAD-1AF4-49AC-A0E6-A88AB84CD919\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"05FD0767-03F3-416C-AB6D-6BC4A12220B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"8452D554-8DEB-4265-839C-6B40CCFB56B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"94F445F9-57A5-4453-BB5D-290349C04A80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"62C97D20-4152-47C4-B21B-8206CF49E20A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE619C15-8D20-41F3-B1C4-5124C1CBF152\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28:rc9:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8575C9D-02D2-4BC7-AE4A-8AFAB5025599\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"217715A5-E69D-45C0-B8E4-5681528C651B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A87AD66C-4321-4459-8556-3B0BA38C493A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87A347E0-9C0B-4674-9363-3C36DA27AC45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E0F3DF0-6BD0-4560-9A13-C6493939D8B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38A55F08-88A9-42D5-A2B1-8B8C0D6DED09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3975EC77-D33D-4167-91BE-08237C3EE9D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A0F2534-C267-43D9-8365-C00CD979B052\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27430190-EB83-43C5-9584-4F65CF65151A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C386B13F-9D7C-45F8-B86A-886384144A8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D48FD9D7-E775-4E26-AEBF-01A09C404D6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"89EA3CF3-0AB7-4648-96BA-25E978D2C8C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"92058AE0-2E52-4304-B4C6-871AB1CE42DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"C41EF454-F2F4-4B85-BF76-9CC52A087AF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"9114A0F3-C729-44D8-AB8A-9078DCD43C51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B630045-5F5B-422B-9947-D899599146F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"5ADBCB22-86AE-487D-8C52-86DFE6B5E9C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF46B929-FA99-4BF7-97FC-0F795CD511A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04BCABEB-DE2A-4C85-BFD5-7A1318479ECA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A67A63E8-837E-4162-999E-3B3DAAE57C96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A701E87D-B807-426E-9CD4-6721DBCABE19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66F6E506-EC0A-4784-BDA3-B7B5CD938B92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBFA0277-B491-4BB1-88DC-85362F0A689C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE922924-6496-4D24-94A6-8EDD431A4568\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10E55450-F6D9-483C-9CC8-E651E5A12AB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"45273823-29EA-44DE-8444-3933402C5793\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"88F60E74-09DB-4D4A-B922-4A46EED0EC20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E242D3DE-D1DC-406A-BCC3-C4380B7EC369\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EE58B00-70BB-493D-ACDE-77F486984392\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"8598D6E5-0C5C-4A31-841A-C12801DB7D91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"59800B0A-477B-42F8-A58A-5144F455AE01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"65210718-2AF2-47E5-A1A7-CE72B926F9F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"724E1180-5A91-4503-8723-C59528794884\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99AC6D46-A0BF-4F1D-88BB-03BF74FDB84F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC40B6DE-09D9-422B-965B-7EB9F6661DEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEFB6E91-34CD-4FC5-A8E1-8F5760A9B4C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91170B40-4D25-4E40-8F0B-DBC1AE217F99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E28B8B9-B832-4D77-BE1A-BB5D8A678678\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56DF61F4-5DA1-4D79-B6C0-0E4DB825FB3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"468745AA-0BE5-4B22-91FA-2FD350BD2F64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF208118-3534-47E5-9943-83EF165F1249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"427E3009-A2F2-4ED2-8D1A-14938F639D2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD3663BD-4EF5-496C-A573-2639C9E72214\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4033E0B-A3A1-4CC5-956A-AAA0FB905DDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"29C4A364-ED36-4AC8-AD1E-8BD18DD9324D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4049867A-E3B2-4DC1-8966-0477E6A5D582\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2507858-675B-4DA2-A49E-00DB54700CF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A25EA55-3F1C-440C-A383-0BB9556C9508\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2665356-4EF5-4543-AD15-67FDB851DCCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"26E7609B-B058-496D-ACDD-7F69FBDE89E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"210BF049-8B3C-4ACC-BF8E-2C3551477602\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"1837F32C-80D3-4E10-AE5D-E9F5A11A434E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B4E132B-A69A-4CD1-B4D9-E17C4361A3AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC3151BF-4BEE-4415-ABA2-E6D40673E591\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1037E899-6DB3-423D-9AD0-FE79A67E9681\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4DD2F05-F990-417A-BD6D-CD9A7EB2BD55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0634D7FE-7685-4669-8EF9-54E99683D28E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EEEB962-0E8D-402B-989E-96875453C609\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0042D9C4-7081-4DC2-A5B5-2649374B44F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CD18FA2-677A-4934-88E6-0BB78D789875\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24EF19A2-A1CC-4410-8704-EF4041428383\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9502A7E-2BFF-43A7-BF6B-ADC023BD9331\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DC9A36E-1779-49DE-83CE-B8479CA018FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60B18050-4720-4ACB-AEE2-DEB4BFCA7B6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9704C4B5-28F1-4F62-A389-8A9917E8E99D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6574F543-0B91-49A6-81FA-8142007BCD54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.31.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CD7F9D0-3AE3-4687-B1C9-36AD04D96F52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46568A0D-F374-4DAB-9B64-FCC74A9AA07B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C85D4E0A-14DA-4884-AF6F-A0F54304430F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"218DE1D1-3843-4076-9AE4-70AA0FD99B3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"2677114B-AF05-42EB-BBC8-FA85CD631C21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA8D64E1-A700-4D9E-9063-EC3CFC1A6D98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B6C0A59-556F-4579-9AD2-4ABAE01FE2CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBE3083A-0FA6-4854-8F65-05E8364B3A9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"57F8D95D-DC49-46B3-A460-2352D7E540EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"084A2575-E5A6-43BD-8CE5-1EF628AA9ACB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"041CE8AF-711C-496D-BDF2-B4AB655C0C8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE192302-F569-4301-83F2-AEE020FB77B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2597A691-01B8-4FD2-AF71-D4BCC15C6F10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"533A03F0-D7C4-42EF-BAD7-2B5A9A9D68EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDBA84AD-CB87-418B-BBF7-8E910FB8FD5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0FA9FA7-3BE3-415B-AA06-A2401B2AD8DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A93EFB49-0195-4471-9445-DA944CD55459\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"075C2C0A-E5E7-412C-9B28-3E3363A2DF05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"534281D8-EAEB-4E78-8835-E6BA318BE866\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"192A8675-4413-4ADD-BF9E-DFD757C76387\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E15D428-B54A-499D-8677-63C73A2C2934\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8804EC33-1751-4493-98D7-B85F326ABAD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC94715E-208F-421E-8FCA-81E86175C983\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"982071FC-873D-4C38-817B-F5853699135D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B721839-AB4C-4DE7-834F-E790DE770066\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75965543-51D3-4809-8815-EA80BAC85C98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CEC8F08-EE90-41CA-A30F-D34290168571\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A23998B-F0EE-4143-A206-AFD47EC8BD2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAB711D9-B2DE-4C8F-A03C-EFF57664416C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A2B2D5E-FDBC-4BCE-9925-1F6D5256C237\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BC0D45F-8619-4EB7-B074-90CD70A4BE6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7A7996C-04D2-4B0B-A1AE-E4430DE9BB80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD8BC35B-8304-4B11-BD48-A8633B1D97AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44A8D565-A7EC-47CD-A72E-FBFDC6254718\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0521A4B9-8A42-41B8-AD31-BCEB90D1E58B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.32.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9428FC60-D446-46C0-9305-127BCCF11E4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D81C2911-5781-46A4-AD27-F946BD44EAEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DB53511-E1B0-4F81-BE9E-B52E84E9C30E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"207306A0-19F5-4E49-945C-A5E4DD442459\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DE43C00-5967-44A1-ACEB-B7AF66EEBB53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"B33B5E4B-FCB3-4343-B992-F0ADB853754B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7295BBE-A9E3-44F6-9DD6-0FD6C2591E11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"B220EA3F-55B3-4B6E-8285-B28ADEF50138\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"C61AB348-ACF4-4F88-AC9D-BEC63B76399C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3AFD58E-A261-4398-BA11-B62A091261F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17721A7D-E955-407B-AACB-97F859CE79C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B04F515-29A7-4D6A-AFC5-3A115F8A5918\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7514928F-8992-4B8A-8AF4-E89F1CB6EFCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD6324B7-1329-4C6B-8DDB-D489250E07C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7910FE5-E02C-4B20-9F27-F488E76BDE93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96F85BC2-54C4-4450-B3BA-A2A8EB78A81C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25E5B510-1096-42E8-8BD1-E9198D588050\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9F7B49B-7CDF-426C-9688-5E990846DBF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2033D2AE-EB00-4696-B72F-8739021D1788\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"86D3F64C-3F27-43E0-B0D4-62CE1E1F4EFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"7927713B-5EB0-41EB-86A9-9935775162E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"59037296-3143-4FBB-AFF7-D4FE2C85502F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CA27FD5-7DBF-4C85-80A9-D523B2E4B033\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"9711E333-A8E7-4F4B-BCFD-2023E889651A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"E04D3358-973B-42A1-8E08-2E3AE947193C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B39BF614-85CD-4C6A-877C-724FB6F5B125\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD31EA80-D021-4E47-8FB0-E1F23E379EA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C683054-0275-4A92-B003-9C9A5A03B6E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A25DDBE8-9DA5-4515-AAAF-037D4D201898\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4499A795-2C87-4E0F-BFFB-63E47AE3EEB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D11D058-0864-415A-97D6-C67BBBEB0E6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.34.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF479FF8-8EB2-4436-89EB-FBA3EFA41184\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5480B0CF-B462-4172-9F6E-D94B451CF869\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"17ACC235-F2C3-42B5-9244-DCCDC4704BA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA4BC3D2-70FF-4EED-9DC8-B378F88F4D36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7ACC123-06D8-4A3F-8730-AA7FF6EFBD35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F6891F7-2B07-4A96-A0D6-AC528B7E0DD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"657BCE5D-DC8B-4BE2-AED8-BC52C738F999\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"160E9402-241A-44AE-A92A-9629CA656F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2CD9FB1-AB83-427A-8923-97ED7ADFD63D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B2E5B71-BF7F-426A-BE5E-0481010725E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4540D1DF-9ED8-45DB-B868-BD195DDCB8B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB33FE45-7254-4F8D-AC22-0FEA559A8567\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52E43E71-2F62-40E5-BF56-15D26806B7AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B422B61F-AE80-4F86-AACA-F86EE47983A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDA2DB37-7A2D-400D-889E-36175DCDF3FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40C2CAA9-8EAF-43C7-B0CE-D1A09663C49B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.35.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA1CA35C-5F52-4095-B0EA-7A22481F4360\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F73DF14-B205-4345-8D2C-9F6F917C7998\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBE26099-6D2C-4FAF-B15C-CBF985D59171\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2C193FF-3723-4BE9-8787-DED7D455FA8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"F874FE6A-968D-47E1-900A-E154E41EDAF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"14B7B8AE-CE83-4F0E-9138-6F165D97C19F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"B434ACFB-2B01-491A-B2E5-40FA0E11B3B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF88CADB-AB36-4633-807B-44AB3145F748\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D9830C2-0E2D-4A5A-B78F-5D4A4721B268\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"99DDA8A0-0A26-4379-B843-4E0B5FDD544F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"907A3F7F-B11D-4CF1-A1B2-A28BBEBF03C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE4657B8-B691-4833-8546-220AD2BA8A7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2455F37-66D8-4BE1-8739-1A20A2E5375D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.36.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2976CCD-B853-4ACA-8970-CE745C73E4AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18CBFC41-E9A9-456C-8A61-8DB2E6CE2E98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EA6C6E6-CAD5-4D43-AD96-66D5ACBB91CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"71905CF7-7C7B-43AC-970D-D3187A807903\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"201421C9-E054-4FEB-A37A-8C314F242FBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"F157225D-C62C-465D-A758-DE6A6C48C397\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"77BB49A9-39D0-49C4-A241-D1537590F508\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BE3273F-0DB1-4607-B92B-C0A7BC099C91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BAF52C2-38F2-45C0-B6E7-7096B8A4FEEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"13205DB7-6988-4D68-A944-B1EA3C145B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF9A28CB-B307-4D0B-AC45-73964F766B09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51838021-099C-4135-94E6-EC0276BAB750\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0F4EBC4-1C6D-428C-9F23-8508EBBD3588\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B86233BC-2B7D-44EB-8253-458E89046B17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"110BB215-C869-4BEB-962D-81A1F9F896B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.37.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAA72229-347A-4AAE-B75D-9C3472D347F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DDCB342-4F5F-4BF1-9624-882BBC57330D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3AB4113-BF83-4587-8A85-0E4FECEE7D9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B57F5AD-A697-4090-89B9-81BC12993A1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA141BCB-A705-4DF5-9EED-746B62C86111\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9ECE134-58A3-4B9D-B9B3-F836C0EDD64C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.38:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"56186720-6B4C-4D71-85C5-7EAC5C5D84A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.38:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BBB4630-CBED-43B9-B203-BE65BBF011AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.38:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD375A78-63D7-441A-9FB0-7BC878AB4EDD\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de b\\u00fafer basado en memoria din\\u00e1mica en la funci\\u00f3n is_gpt_valid en fs/partitions/efi.c en el kernel de Linux v2.6.38 y anteriores, permite a atacantes f\\u00edsicamente pr\\u00f3ximos causar una denegaci\\u00f3n de servicio (OOPS) o posiblemente tener un impacto no especificado a trav\\u00e9s de un tama\\u00f1o manipulado de la cabecera de partici\\u00f3n EFI GUID en un medio extra\\u00edble.\"}]",
"id": "CVE-2011-1577",
"lastModified": "2024-11-21T01:26:38.317",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 4.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2011-05-03T19:55:12.807",
"references": "[{\"url\": \"http://downloads.avaya.com/css/P8/documents/100145416\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://openwall.com/lists/oss-security/2011/04/12/17\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://openwall.com/lists/oss-security/2011/04/13/1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-0833.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://securityreason.com/securityalert/8238\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://securitytracker.com/id?1025355\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/517477/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/47343\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.spinics.net/lists/mm-commits/msg83274.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=695976\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/66773\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://downloads.avaya.com/css/P8/documents/100145416\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://openwall.com/lists/oss-security/2011/04/12/17\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://openwall.com/lists/oss-security/2011/04/13/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-0833.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securityreason.com/securityalert/8238\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1025355\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/517477/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/47343\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.spinics.net/lists/mm-commits/msg83274.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=695976\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/66773\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-1577\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-05-03T19:55:12.807\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en la funci\u00f3n is_gpt_valid en fs/partitions/efi.c en el kernel de Linux v2.6.38 y anteriores, permite a atacantes f\u00edsicamente pr\u00f3ximos causar una denegaci\u00f3n de servicio (OOPS) o posiblemente tener un impacto no especificado a trav\u00e9s de un tama\u00f1o manipulado de la cabecera de partici\u00f3n EFI GUID en un medio extra\u00edble.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.38\",\"matchCriteriaId\":\"F68ABAD0-43FB-4476-A98D-CD8A403D495F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C14A949-E2B8-4100-8ED4-645CB996B08A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"81941077-0011-4272-A8C7-21D0AFE7DECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B2EDDD7-5B3E-45AA-BC42-A6FF516B8F57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"02F89C7A-24F2-4518-A605-78A5B7056A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C43BA02-0686-42F0-B901-4CB88459E2D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"59393187-1D1E-45CD-BE0E-385F978E4834\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0CCDF6B-0365-4553-B161-3F6D68A58F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B2BB71-0489-40F6-9CB6-A95B96E92106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"842ECCE2-60F0-41C0-9EAA-A43AF97F61AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F0391C-D4CC-4652-A24C-DC47F4C3DC91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"56340FF9-EE77-4EB3-9720-240FAAEF39F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"79EB0E94-6AE8-4703-96BD-B927E0F2893F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A1F1242-0F07-4D81-9175-3BA5B2C7B564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECBCF2E-95B3-4BE9-9B93-6390AB578C7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF4EC75-06A2-4BD4-A39A-183F00C46E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0934C49-5F88-4189-BD88-2F32C39C2F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFC3618C-FBE8-4F7C-BECE-F2CDDF785599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6501752-2595-4412-9140-C78EB9FD41CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B0A230-4054-4483-A3A7-9A5A286C7552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D78F881-DB3A-423A-8DAD-314645B2B3EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77D4CC4-7008-4E6F-A8CA-62DA244BB3AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F90242EF-048B-4539-AA41-87AA84875A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4E9325-2A70-4E15-9AAF-5588BF218055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"01402A85-B681-4DE0-B7BB-F52567DA29E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"70D1E088-5A9B-4CBF-A4FF-969201942CCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455E647F-73DD-400A-AA19-3D93FE2E57AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC106BDA-2EA4-41A2-AA01-6352A5C255B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB515243-7519-4CA4-9267-D9A6798CBC49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B672E1B6-E8E9-473F-853F-906EA56D712E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F727CD3-D3C2-4648-9EC5-092DF3F73B13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B130EB7-A951-4717-A906-E2F602F7B69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1765065-ABE5-478C-9ACC-EFFA8E4A7043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DE0233-BE28-4C0A-B9FB-2157F41F8D4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2422569B-02ED-4028-83D8-D778657596B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66E4653-1A55-4827-888B-E0776E32ED28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C8994CB-7F94-43FB-8B84-06AEBB34EAE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"95DD4647-564E-4067-A945-F52232C0A33A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DE32C2-5B07-4812-9F88-000F5FB000C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936B7EE-9CD1-4698-AD67-C619D0171A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"169446DE-67F8-4738-91FE-ED8058118F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F76C298-81DC-43E4-8FC9-DC005A2116EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AB349B2-3F78-4197-882B-90ADB3BF645A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC88830-A9BC-4607-B572-A4B502FC9FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"476CB3A5-D022-4F13-AAEF-CB6A5785516A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CFD5CDD-1709-44C7-82BD-BAFDC46990D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"93F0834D-C5EA-4C96-8D6C-3123ECF78F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1784CBC-BEAF-48E5-95A4-2A4BD5F9F1BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"31523E67-5E4F-43F7-9410-20CB3F287DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9F976B-1328-40FE-A1F2-C1DF3F836604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B627DE3-2702-4EB2-9733-253D315FB594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E1B011-8D20-448E-9DD5-023DD30D1FE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A29A4BC-0442-458E-A874-BF0D0F2870FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"04F25DE0-CA8E-4F57-87A5-C30D89CC9E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F87F764B-4097-44FA-B96E-A5DA75E31F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7025803-C679-44DB-ADEE-864E6CAAD9B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"24B879D6-4631-49A8-9366-75577DFB755D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B76C21-70C8-4911-A24B-270F876EF7C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25379B32-D898-4E44-A740-978A129B5E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B90F8F2-9549-413D-9676-3EF634D832B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BEE46-088A-494E-8E18-03F33F6BBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF35478-B292-4A00-B985-CEEDE8B212C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7344B707-6145-48BA-8BC9-9B140A260BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"390B1E09-7014-4A74-834C-806BBEBAF6F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEF02479-2124-4655-A38D-A4793D3B8A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FB5CF04-B5B6-4DFB-B051-61EDA257019F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A89DC9CD-C06F-4B9B-B376-900E65016296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"15BED7A7-3E96-43EF-8B6F-3C94897C3AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6FCAC4-B6C6-4125-B3AC-F30407AA7738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"707ECC75-65B6-4B02-BE85-A4804549A2DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B753112-CCDE-4870-AA97-4AAA2946421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B3AFE7-F4FF-4144-9046-E5926E305A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7616E197-ACCA-4191-A513-FD48417C7F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE2F94D-E8E0-4BB7-A910-378012580025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F5AE3B-B701-4579-B44A-0F7A4267852E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1369C4A-EF3B-4805-9046-ADA38ED940C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC3639E1-B5E4-4DD6-80D4-BA07D192C42D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"54393D69-B368-4296-9798-D81570495C6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6791A801-9E06-47DD-912F-D8594E2F6B3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE90CCED-3A5B-46E3-A6B0-4865AB786289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E452E4-45A9-4469-BF69-F40B6598F0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48777A01-8F36-4752-8F7A-1D1686C69A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747F1324-AEFA-496F-9447-12CD13114F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795C3B17-687E-4F33-AA99-8FEC16F14693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900D6742-DE0F-45C5-A812-BF84088CB02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D88ED3C4-64C5-44B2-9F23-E16087046C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FB31E5-190C-489A-AB30-910D2CC854F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6316369-B54A-4E59-A022-E0610353B284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C3CE0-E12D-4545-8460-5A1514271D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83700989-8820-48DA-A9FE-6A77DF1E8439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F4CEC-7781-468B-B460-4F487B7C6601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C75A62-8807-4821-9362-1E0D63C0A1B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9960640-F02D-4E81-A34B-1893D8FD7F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C398D26-7132-4A6E-9003-77246644451B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B21D90E-5172-485E-87AC-F1681604AD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641EECFD-A985-4026-A53A-10FBE47EAD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47595F81-2083-4236-A0B0-E2B98DD78402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F5FC758-5A5D-466A-8386-5FC469F79F66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12547B6B-78F1-4426-81CE-5F208794658C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38429E64-276B-46D4-AACD-05349D6F6615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E89640F8-313B-4A36-A591-36645D1EF838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B42F06-AC6D-40F3-BC03-5126BED48F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8002C7-19E2-4F20-890E-4BA2029174D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34FC90C2-AED0-4EAF-B5E8-DE75961DA26E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DA9C54-742C-4057-8BAB-18755B4A42D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53037B40-D534-41D1-9895-8EDB0D884C3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5549096F-C640-463E-AD07-FD8D254CC098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8DCAF19-879C-42BB-B56A-84504E79758A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"980A6C7D-6175-4A44-8377-74AA7A9FD108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C226902-04D9-4F32-866C-20225841ECF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"655DB612-AF49-4C17-AFB9-2E33EE8E0572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1F65DF2-2794-47B7-9676-CCF150683CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1817C772-D367-4ABE-B835-466D31A6DC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484B41A-DFB6-4481-80D8-440C711CEA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2975DF7-F916-456C-BF7C-2694559E5282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D97ED16-D6B7-4445-889C-4D6DE2EDC49A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFB2843-A867-48EC-97D7-B106C7BBAED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CD3FE23-1A10-47E6-AD7E-D67F1BE3C5E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F39FC76-7D77-4064-94D3-A16C436FA8D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC547EB-9308-4477-8256-A0E04B42D6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6940324-0383-4510-BA55-770E0A6B80B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"228657B0-0CDF-4D02-B2CD-0C43063BF51E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB1E1A8B-6FA1-45AD-B034-EC34884527DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2684C91-2291-4144-B482-E7816C2A3CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B1D523-89F6-4010-9F8D-430083131730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"15039537-3667-4F88-84AF-7526C2625571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"99071C5B-0D2B-401E-B924-D0C64F66B048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5330C89-3C98-4003-A989-A232B30BBDBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480F035A-A59D-4113-A246-DF108BB2F591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D39E29-B2A0-4075-84AF-994C27AB0A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19879317-B067-45DA-B497-21EBDDDC2521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D220C745-28AD-4D04-B2D2-A090D229206E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF8895-7BF8-458E-B2BB-68699AABC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF495E58-DA6C-402D-B381-4929CB8A502B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A591301C-C30F-44AC-90F0-709A18AA96E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610A93BB-70E3-4BF1-83E8-8A7388477F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821BD11F-3C6A-4424-BC9B-DFD786248B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F55A024-9F8E-44F8-A0D8-696BC232524A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B422D1-6C6E-4359-A169-3EED78A1CF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"08A6E33E-5847-45DA-B9C9-79A7C5C877D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F60C33-3CEA-45F0-97FA-18C029270190\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"247E13CB-9B11-4B64-80AD-C0F8482CCC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"903FE5D3-A9FB-466D-833B-448233BB0803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"958EDC43-0848-4D93-9D07-6A085A5940B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD35F21D-0A28-4C14-BCF5-8EDA760701C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AAD8BE9-A05B-40E8-80DF-0B2878968BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB759752-DC19-4750-838B-056063EFDC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99662904-E5E3-4E81-B199-39707EAEB652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AAA75FD-FBF0-4D0D-9485-9CC19559DD66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"053D359F-F2DA-47DB-9DD1-B49811DFF620\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"39CBD1BA-B8A9-404D-9E94-5E643EE313CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6465E61D-0238-4ED3-B4CB-E3B93F4F324F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"830B8340-2B8F-4F0A-8943-F4413411573C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D123AAFE-3F17-45C4-9382-BA392FD022C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0C256E6-2691-4478-A51C-DE580A717AB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B179CF1D-084D-4B21-956F-E55AC6BDE026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432CA976-6EFA-4D34-B5EA-CD772D067F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E476195-657E-416E-BC16-44A18B06A133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70460F6C-D6C0-4C1A-B13E-368705EAF223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBFF148-3EDA-4216-910B-8930D8C443C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF566DA-0F04-48DA-AA40-565979C55328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990C6C2-2F66-4C4D-8224-74163865F410\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C23AD176-3B99-4593-BCBD-13C1E579A13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"034DFD7F-8919-4245-8480-7B272F591271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEBC606-6488-48CE-8AA8-5B8CC724D5D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83C60AF-50A9-480E-860D-45E80AC0A6B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E249774-CE05-43D5-A5A3-7CCE24BB2AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D42BA44-C69B-4170-9867-CABF93CA9BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6BCD075-9FCE-496C-9807-3A13998129B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"460BC48C-1598-4739-A64B-A2350BC6BD28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7700AB42-8543-4FA5-9BAF-EF2F126E9375\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C31F2D-385F-46CF-8F04-61157EE35013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3588EB36-674F-49FB-A51C-0B52F8BFD9D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C93A9E4-08DA-44D2-B6D9-76BD287FA5DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5575728-D466-4CC9-95BA-8CA433D19566\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140380C-71BD-464F-AE53-1814C2653056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EC0A7-8616-4039-B98B-E1216E035B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FB141B-FA2A-435D-8937-83FC0669CB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FC6CE2-8717-4558-A309-A441D322F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BE336-7BB2-47C0-AED5-3DEA706C206F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F9887E-2466-4C73-A8E1-2117492F9EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FDE5B27-2EF0-464E-8F14-5E809D84D389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"815B2EE8-136F-44E4-997D-5F93A54775DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"085259B8-9D41-42B0-B32B-66B8D365F106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A12DE15-E192-4B90-ADB7-A886B3746DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6588E7-F4FA-40F5-8945-FC7B6094376E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE87E13E-ACF7-4F74-8938-729F3B0D694C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4965A12-1BBA-4494-A5C1-43E0C0F48C14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7A18909-B468-4A5C-8DCC-2690F1F1D6C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEFCCCBD-B3EA-4A78-BEF9-6BD4793AAE10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8AF0C46-6BF2-46A3-8AD8-1E521E736169\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52152F5A-1833-4490-A373-9C547B90B0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64A095E-5E97-445E-B435-F09983CC0E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE92406-DBF3-463E-8A51-F9679E851FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C60D19B-ED9B-443C-9D49-002ABD381119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"264C61EE-64F6-43AD-B54F-7D683C29E64F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0149408A-30F6-4EDF-8B3B-CBAB884CE758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71295664-89EC-4BB3-9F86-B1DDA20FAC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC2C3D3E-3765-423F-B41B-35096E5154A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDCD92E0-2C08-429B-BB00-BAAB1B5FD79C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C19C7509-16AD-47C3-B984-A350D8F1C87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"17593F6C-75DA-4936-8AC3-81631A715DD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6113F66-4F25-4302-9986-D75532F59E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"00763CAF-AEF8-4EF1-9393-DEFF9697D382\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D5310FC-8432-4BBF-8174-60F7B8A608B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"4254F56E-6BA0-45DD-95D1-61A7C8AF7BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8957EE27-E19A-4DE6-B46D-FE413E88BD93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37BE853A-BA6F-4A70-B166-E34441F0B7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85064FDF-4B62-43BF-B36C-F659D739BC22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEADC505-FF44-4D45-8EA6-B23A1C4564D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE3C807-5C9B-4B71-868B-DF17ECB1514F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B6847C-873B-4BE1-852D-239115E59BA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF41209E-D27F-4642-A405-90E822A41897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F59FD9-46E5-4F63-80A0-091AD44D1867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"428844A5-E020-4AE9-8012-9AEDFCB7C32E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94C9D70D-A552-48D6-9497-EE07EB5649D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF6169FF-9FF9-4A81-BAEB-6D5132F64F61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6DC79CF-A504-4232-9F66-B5DCD0213DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192B4273-0935-4232-BBFD-A850855CAC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E9FDA8-7EC3-4B9B-B508-27F948D60DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A16F2182-C489-4CA9-A56B-01463148D16F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"630A56D3-7A82-44DE-8888-2EB8CD1C24A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0D6431-E8E0-4079-A1A0-9CE6D1D67709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4EF7A7-6E96-43B4-8287-368098ABBFA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF91995-A084-422A-A544-30B0B4D75E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45F4429-5A9C-4E8B-96EE-CCF19776CABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA5634BC-FBAD-4B96-A88E-282E4F97A286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"285DF725-52A0-4087-BC0D-32A0817CCB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B2BB4B5-0553-4150-AE64-1E52865C5B79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"12D0C03A-7D30-485F-8431-638918FE9658\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B8E0DDC-7566-4EF9-9A8F-B1870CA83144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"764777FB-FD1E-4930-899C-AC5D2DF293E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"95461D7E-A080-4B9E-BC72-6BDBC1C1A447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"D913E879-38EC-46AE-9F20-5D3E5F2CDCC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"B264E869-1A6C-4D85-9944-2E4EB523CD82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EFCAF09-BB20-424C-8648-014C0F71F8A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A74970C-5EEA-47A7-A62D-AF98F4D1228F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA56669-B09E-42C2-9591-245C46909A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D08D180-23F7-456F-98CA-26B53C678D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E3C363-49C9-4869-83B5-76C14100BFF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E1DE903-EDFC-4E0F-8EDF-7762FE3C7C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC02BA18-9235-45CA-A3D6-0EB21CE69DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"856FE78A-29B5-4411-98A0-4B0281C17EB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B59FCD-8161-48EF-844D-8FA1AB2FAA76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA311B8-D32E-4853-9B07-58EAF1019D0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F0F679-43C8-426E-A97E-C3B207A3331C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE6A7F3-3D04-4119-874D-DA2FA86B7BE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA40BC48-D6B5-4424-B306-F99E85EBBCB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C2DF2BB-F94A-4692-AFDC-47C42F04081B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB286B42-E739-46CD-BC96-972CFFAECB0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"7636014B-CC2A-43A3-9C9A-04B26AEB06D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4ED7CE5-3388-4CB9-AF60-A2AF19611327\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"324B5A3E-FA65-4F02-9B8F-872F38CD1808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE21E2AE-9E01-471C-A419-6AB40A49C2F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADFC2D46-65D0-426F-9AF8-8C910AE91D49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11795F8E-7ACD-4597-9194-FC7241DCE057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F381E1-F3C5-49BE-B094-4D90E7B108F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D82A6217-CFA6-4E72-8BED-0297E13EABF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7954A701-1671-4080-B1E6-47E0208FD28C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D06512-EAF0-48C6-98F0-066E63FF07EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F35DA6B-C6D4-47CC-97E7-9659DCFDD162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75B48F1-623A-4B96-9E08-4AA2DE748490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E6EB7C3-D9AB-43E7-8B78-2C36AE920935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FC87A28-C6A1-4E90-BD9F-A5BE1985DB50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0383E2A5-60EE-47F3-9DA8-BF75028D511F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B0C229-2A79-47E0-856A-2AE0FF97B967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB27B247-D6BF-49C4-B113-76C9A47B7DCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F94BA1B0-52B9-4303-9C41-3ACC3AC1945E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ACBB194-1D24-464A-B79C-44B8127EAD52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83E5F269-7711-447D-B798-0F5478E36299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0138807-6313-4A3F-AB5A-4B7D4A9BE287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BA2227-F259-499D-BF50-5074B1E7DD3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78A896D0-032C-4467-9D57-E47E8C612704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D1D4C8F-8C09-4A49-AFFD-33093AE7A437\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A415FECF-89CC-4D71-B1BF-6A678D32599D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98F77E54-5F4A-4D47-8DE8-097B4BBC7944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"752148FC-1594-4108-AE0F-C5145B978454\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09546671-E75D-4F50-9D86-DFDDAC9DC5DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC7A2D7-ACB4-4871-B7C0-02711A53DF1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6964925C-4394-4E82-976B-770A99E74F1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E8C909E-02D7-4B29-AA68-897BD0200B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA036609-ADD3-4903-AB9D-E8BF81CFC776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F9E122-994B-4276-9FCF-A8E4D2D06D4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A15720C-3BDF-4343-B270-2575978293EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5ADCFA-2CD8-4A00-AFEC-B84F7E0015A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EA2EE9B-27FD-49FE-8665-159DABA0E3C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C81C5F8-2224-4D84-B7C0-E18421276AFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B44A2C76-174E-40A5-9603-3B84D0D35557\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42ACE154-0709-4AA1-82E3-1B7F34E63187\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3022E902-9F0D-49FF-9279-71E0E1E8A873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDF77B26-91FA-4245-BFEC-43FD021A28E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"601B4C93-9A9C-40E8-A9D0-DA9D71C745EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF7CE35A-87A4-4D95-86F9-211D50E30482\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA8675A-A37C-4658-9D26-3359EBA277B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00E8CB86-ECEE-4435-BEFC-B8D209B2C5AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B373DEAE-8F8B-44AA-BAE5-3A0120A541F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D40063F-13D0-4897-AE71-1C7B617C8855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC7E89C8-CF89-4FA8-A9F1-F0B415E5FE10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4034EFE6-449D-4749-9265-B47D44AA4EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F835D17-ACF9-4AE6-8C38-B74BE448B8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21A12676-7EBE-4D83-83BD-D46CC7A1773A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FB112DB-891D-4FDB-8772-2E233A39A7BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B3A0794-B10C-4DFD-9CAD-202CA1DC9250\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76E86CE6-CD1C-4412-939F-B45867068D44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F6896A4-16E0-46B6-B90C-5C002C526478\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469534AB-2D0F-4B31-8121-05A792FA9332\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2820354-F25B-485D-9FA7-E32B38DDBB1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26BD805F-08EB-42EC-BC54-26A7278E5089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3463B83B-E46F-456E-98BA-801C59AEB337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A1A8F2-F892-4EDC-A5DA-1BBD6993E84E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"60EFBFAD-1AF4-49AC-A0E6-A88AB84CD919\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"05FD0767-03F3-416C-AB6D-6BC4A12220B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8452D554-8DEB-4265-839C-6B40CCFB56B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"94F445F9-57A5-4453-BB5D-290349C04A80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C97D20-4152-47C4-B21B-8206CF49E20A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE619C15-8D20-41F3-B1C4-5124C1CBF152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8575C9D-02D2-4BC7-AE4A-8AFAB5025599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"217715A5-E69D-45C0-B8E4-5681528C651B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A87AD66C-4321-4459-8556-3B0BA38C493A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87A347E0-9C0B-4674-9363-3C36DA27AC45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E0F3DF0-6BD0-4560-9A13-C6493939D8B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A55F08-88A9-42D5-A2B1-8B8C0D6DED09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3975EC77-D33D-4167-91BE-08237C3EE9D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0F2534-C267-43D9-8365-C00CD979B052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27430190-EB83-43C5-9584-4F65CF65151A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C386B13F-9D7C-45F8-B86A-886384144A8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48FD9D7-E775-4E26-AEBF-01A09C404D6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"89EA3CF3-0AB7-4648-96BA-25E978D2C8C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"92058AE0-2E52-4304-B4C6-871AB1CE42DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41EF454-F2F4-4B85-BF76-9CC52A087AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"9114A0F3-C729-44D8-AB8A-9078DCD43C51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B630045-5F5B-422B-9947-D899599146F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ADBCB22-86AE-487D-8C52-86DFE6B5E9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF46B929-FA99-4BF7-97FC-0F795CD511A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04BCABEB-DE2A-4C85-BFD5-7A1318479ECA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67A63E8-837E-4162-999E-3B3DAAE57C96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A701E87D-B807-426E-9CD4-6721DBCABE19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F6E506-EC0A-4784-BDA3-B7B5CD938B92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFA0277-B491-4BB1-88DC-85362F0A689C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE922924-6496-4D24-94A6-8EDD431A4568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E55450-F6D9-483C-9CC8-E651E5A12AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"45273823-29EA-44DE-8444-3933402C5793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F60E74-09DB-4D4A-B922-4A46EED0EC20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E242D3DE-D1DC-406A-BCC3-C4380B7EC369\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE58B00-70BB-493D-ACDE-77F486984392\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8598D6E5-0C5C-4A31-841A-C12801DB7D91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"59800B0A-477B-42F8-A58A-5144F455AE01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"65210718-2AF2-47E5-A1A7-CE72B926F9F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"724E1180-5A91-4503-8723-C59528794884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99AC6D46-A0BF-4F1D-88BB-03BF74FDB84F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC40B6DE-09D9-422B-965B-7EB9F6661DEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEFB6E91-34CD-4FC5-A8E1-8F5760A9B4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91170B40-4D25-4E40-8F0B-DBC1AE217F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E28B8B9-B832-4D77-BE1A-BB5D8A678678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56DF61F4-5DA1-4D79-B6C0-0E4DB825FB3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"468745AA-0BE5-4B22-91FA-2FD350BD2F64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF208118-3534-47E5-9943-83EF165F1249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"427E3009-A2F2-4ED2-8D1A-14938F639D2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD3663BD-4EF5-496C-A573-2639C9E72214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4033E0B-A3A1-4CC5-956A-AAA0FB905DDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"29C4A364-ED36-4AC8-AD1E-8BD18DD9324D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4049867A-E3B2-4DC1-8966-0477E6A5D582\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2507858-675B-4DA2-A49E-00DB54700CF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A25EA55-3F1C-440C-A383-0BB9556C9508\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2665356-4EF5-4543-AD15-67FDB851DCCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"26E7609B-B058-496D-ACDD-7F69FBDE89E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"210BF049-8B3C-4ACC-BF8E-2C3551477602\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"1837F32C-80D3-4E10-AE5D-E9F5A11A434E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B4E132B-A69A-4CD1-B4D9-E17C4361A3AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC3151BF-4BEE-4415-ABA2-E6D40673E591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1037E899-6DB3-423D-9AD0-FE79A67E9681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4DD2F05-F990-417A-BD6D-CD9A7EB2BD55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0634D7FE-7685-4669-8EF9-54E99683D28E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EEEB962-0E8D-402B-989E-96875453C609\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0042D9C4-7081-4DC2-A5B5-2649374B44F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CD18FA2-677A-4934-88E6-0BB78D789875\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24EF19A2-A1CC-4410-8704-EF4041428383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9502A7E-2BFF-43A7-BF6B-ADC023BD9331\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DC9A36E-1779-49DE-83CE-B8479CA018FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B18050-4720-4ACB-AEE2-DEB4BFCA7B6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9704C4B5-28F1-4F62-A389-8A9917E8E99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6574F543-0B91-49A6-81FA-8142007BCD54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.31.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD7F9D0-3AE3-4687-B1C9-36AD04D96F52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46568A0D-F374-4DAB-9B64-FCC74A9AA07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C85D4E0A-14DA-4884-AF6F-A0F54304430F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"218DE1D1-3843-4076-9AE4-70AA0FD99B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2677114B-AF05-42EB-BBC8-FA85CD631C21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA8D64E1-A700-4D9E-9063-EC3CFC1A6D98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B6C0A59-556F-4579-9AD2-4ABAE01FE2CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBE3083A-0FA6-4854-8F65-05E8364B3A9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"57F8D95D-DC49-46B3-A460-2352D7E540EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"084A2575-E5A6-43BD-8CE5-1EF628AA9ACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"041CE8AF-711C-496D-BDF2-B4AB655C0C8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE192302-F569-4301-83F2-AEE020FB77B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2597A691-01B8-4FD2-AF71-D4BCC15C6F10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"533A03F0-D7C4-42EF-BAD7-2B5A9A9D68EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDBA84AD-CB87-418B-BBF7-8E910FB8FD5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0FA9FA7-3BE3-415B-AA06-A2401B2AD8DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A93EFB49-0195-4471-9445-DA944CD55459\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"075C2C0A-E5E7-412C-9B28-3E3363A2DF05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"534281D8-EAEB-4E78-8835-E6BA318BE866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192A8675-4413-4ADD-BF9E-DFD757C76387\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E15D428-B54A-499D-8677-63C73A2C2934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8804EC33-1751-4493-98D7-B85F326ABAD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC94715E-208F-421E-8FCA-81E86175C983\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"982071FC-873D-4C38-817B-F5853699135D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B721839-AB4C-4DE7-834F-E790DE770066\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75965543-51D3-4809-8815-EA80BAC85C98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEC8F08-EE90-41CA-A30F-D34290168571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A23998B-F0EE-4143-A206-AFD47EC8BD2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAB711D9-B2DE-4C8F-A03C-EFF57664416C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A2B2D5E-FDBC-4BCE-9925-1F6D5256C237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BC0D45F-8619-4EB7-B074-90CD70A4BE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A7996C-04D2-4B0B-A1AE-E4430DE9BB80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD8BC35B-8304-4B11-BD48-A8633B1D97AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44A8D565-A7EC-47CD-A72E-FBFDC6254718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0521A4B9-8A42-41B8-AD31-BCEB90D1E58B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.32.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9428FC60-D446-46C0-9305-127BCCF11E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D81C2911-5781-46A4-AD27-F946BD44EAEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DB53511-E1B0-4F81-BE9E-B52E84E9C30E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"207306A0-19F5-4E49-945C-A5E4DD442459\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DE43C00-5967-44A1-ACEB-B7AF66EEBB53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B33B5E4B-FCB3-4343-B992-F0ADB853754B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7295BBE-A9E3-44F6-9DD6-0FD6C2591E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B220EA3F-55B3-4B6E-8285-B28ADEF50138\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"C61AB348-ACF4-4F88-AC9D-BEC63B76399C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3AFD58E-A261-4398-BA11-B62A091261F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17721A7D-E955-407B-AACB-97F859CE79C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B04F515-29A7-4D6A-AFC5-3A115F8A5918\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7514928F-8992-4B8A-8AF4-E89F1CB6EFCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD6324B7-1329-4C6B-8DDB-D489250E07C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7910FE5-E02C-4B20-9F27-F488E76BDE93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96F85BC2-54C4-4450-B3BA-A2A8EB78A81C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25E5B510-1096-42E8-8BD1-E9198D588050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9F7B49B-7CDF-426C-9688-5E990846DBF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2033D2AE-EB00-4696-B72F-8739021D1788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D3F64C-3F27-43E0-B0D4-62CE1E1F4EFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7927713B-5EB0-41EB-86A9-9935775162E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"59037296-3143-4FBB-AFF7-D4FE2C85502F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA27FD5-7DBF-4C85-80A9-D523B2E4B033\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"9711E333-A8E7-4F4B-BCFD-2023E889651A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E04D3358-973B-42A1-8E08-2E3AE947193C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B39BF614-85CD-4C6A-877C-724FB6F5B125\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD31EA80-D021-4E47-8FB0-E1F23E379EA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C683054-0275-4A92-B003-9C9A5A03B6E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A25DDBE8-9DA5-4515-AAAF-037D4D201898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4499A795-2C87-4E0F-BFFB-63E47AE3EEB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D11D058-0864-415A-97D6-C67BBBEB0E6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.34.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF479FF8-8EB2-4436-89EB-FBA3EFA41184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5480B0CF-B462-4172-9F6E-D94B451CF869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"17ACC235-F2C3-42B5-9244-DCCDC4704BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA4BC3D2-70FF-4EED-9DC8-B378F88F4D36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7ACC123-06D8-4A3F-8730-AA7FF6EFBD35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6891F7-2B07-4A96-A0D6-AC528B7E0DD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"657BCE5D-DC8B-4BE2-AED8-BC52C738F999\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"160E9402-241A-44AE-A92A-9629CA656F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2CD9FB1-AB83-427A-8923-97ED7ADFD63D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B2E5B71-BF7F-426A-BE5E-0481010725E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4540D1DF-9ED8-45DB-B868-BD195DDCB8B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB33FE45-7254-4F8D-AC22-0FEA559A8567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52E43E71-2F62-40E5-BF56-15D26806B7AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B422B61F-AE80-4F86-AACA-F86EE47983A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDA2DB37-7A2D-400D-889E-36175DCDF3FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40C2CAA9-8EAF-43C7-B0CE-D1A09663C49B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.35.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA1CA35C-5F52-4095-B0EA-7A22481F4360\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F73DF14-B205-4345-8D2C-9F6F917C7998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBE26099-6D2C-4FAF-B15C-CBF985D59171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C193FF-3723-4BE9-8787-DED7D455FA8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F874FE6A-968D-47E1-900A-E154E41EDAF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B7B8AE-CE83-4F0E-9138-6F165D97C19F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B434ACFB-2B01-491A-B2E5-40FA0E11B3B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF88CADB-AB36-4633-807B-44AB3145F748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D9830C2-0E2D-4A5A-B78F-5D4A4721B268\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"99DDA8A0-0A26-4379-B843-4E0B5FDD544F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"907A3F7F-B11D-4CF1-A1B2-A28BBEBF03C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE4657B8-B691-4833-8546-220AD2BA8A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2455F37-66D8-4BE1-8739-1A20A2E5375D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2976CCD-B853-4ACA-8970-CE745C73E4AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18CBFC41-E9A9-456C-8A61-8DB2E6CE2E98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EA6C6E6-CAD5-4D43-AD96-66D5ACBB91CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"71905CF7-7C7B-43AC-970D-D3187A807903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"201421C9-E054-4FEB-A37A-8C314F242FBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F157225D-C62C-465D-A758-DE6A6C48C397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"77BB49A9-39D0-49C4-A241-D1537590F508\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE3273F-0DB1-4607-B92B-C0A7BC099C91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BAF52C2-38F2-45C0-B6E7-7096B8A4FEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"13205DB7-6988-4D68-A944-B1EA3C145B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF9A28CB-B307-4D0B-AC45-73964F766B09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51838021-099C-4135-94E6-EC0276BAB750\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F4EBC4-1C6D-428C-9F23-8508EBBD3588\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B86233BC-2B7D-44EB-8253-458E89046B17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"110BB215-C869-4BEB-962D-81A1F9F896B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.37.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAA72229-347A-4AAE-B75D-9C3472D347F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DDCB342-4F5F-4BF1-9624-882BBC57330D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3AB4113-BF83-4587-8A85-0E4FECEE7D9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B57F5AD-A697-4090-89B9-81BC12993A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA141BCB-A705-4DF5-9EED-746B62C86111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9ECE134-58A3-4B9D-B9B3-F836C0EDD64C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.38:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"56186720-6B4C-4D71-85C5-7EAC5C5D84A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.38:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBB4630-CBED-43B9-B203-BE65BBF011AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.38:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD375A78-63D7-441A-9FB0-7BC878AB4EDD\"}]}]}],\"references\":[{\"url\":\"http://downloads.avaya.com/css/P8/documents/100145416\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://openwall.com/lists/oss-security/2011/04/12/17\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://openwall.com/lists/oss-security/2011/04/13/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-0833.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securityreason.com/securityalert/8238\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1025355\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/517477/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/47343\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.spinics.net/lists/mm-commits/msg83274.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=695976\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66773\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://downloads.avaya.com/css/P8/documents/100145416\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2011/04/12/17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://openwall.com/lists/oss-security/2011/04/13/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-0833.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/8238\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1025355\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/517477/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/47343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.spinics.net/lists/mm-commits/msg83274.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=695976\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66773\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2012-AVI-046
Vulnerability from certfr_avis - Published: - Updated:
Un grand nombre de vulnérabilités, dont certaines permettent d'exécuter du code arbitraire à distance, sont présentes dans VMware ESX et VMware ESXi.
Description
Un grand nombre de vulnérabilités existe dans VMWare ESX et VMware ESXi dont certaines, particulièrement critiques, peuvent conduire à une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ESXi 4.1 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX 4.1.",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUn grand nombre de vuln\u00e9rabilit\u00e9s existe dans VMWare ESX et VMware ESXi\ndont certaines, particuli\u00e8rement critiques, peuvent conduire \u00e0 une\nex\u00e9cution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1170"
},
{
"name": "CVE-2010-1634",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1634"
},
{
"name": "CVE-2010-2059",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2059"
},
{
"name": "CVE-2011-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2901"
},
{
"name": "CVE-2011-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2694"
},
{
"name": "CVE-2011-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2213"
},
{
"name": "CVE-2010-4649",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4649"
},
{
"name": "CVE-2009-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3560"
},
{
"name": "CVE-2011-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1494"
},
{
"name": "CVE-2011-1044",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1044"
},
{
"name": "CVE-2011-3378",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3378"
},
{
"name": "CVE-2011-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2022"
},
{
"name": "CVE-2011-1080",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1080"
},
{
"name": "CVE-2011-1746",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1746"
},
{
"name": "CVE-2011-0695",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0695"
},
{
"name": "CVE-2011-2522",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2522"
},
{
"name": "CVE-2011-1745",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1745"
},
{
"name": "CVE-2011-1780",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1780"
},
{
"name": "CVE-2011-1078",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1078"
},
{
"name": "CVE-2010-3493",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3493"
},
{
"name": "CVE-2011-1776",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1776"
},
{
"name": "CVE-2011-1171",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1171"
},
{
"name": "CVE-2011-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1936"
},
{
"name": "CVE-2011-1678",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1678"
},
{
"name": "CVE-2011-1593",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1593"
},
{
"name": "CVE-2011-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1182"
},
{
"name": "CVE-2011-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1093"
},
{
"name": "CVE-2011-2517",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2517"
},
{
"name": "CVE-2011-1521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1521"
},
{
"name": "CVE-2011-1763",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1763"
},
{
"name": "CVE-2011-2192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2192"
},
{
"name": "CVE-2011-0726",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0726"
},
{
"name": "CVE-2011-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1015"
},
{
"name": "CVE-2011-2492",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2492"
},
{
"name": "CVE-2011-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1079"
},
{
"name": "CVE-2011-2525",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2525"
},
{
"name": "CVE-2011-2482",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2482"
},
{
"name": "CVE-2011-1573",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1573"
},
{
"name": "CVE-2011-1166",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1166"
},
{
"name": "CVE-2011-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2689"
},
{
"name": "CVE-2010-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0787"
},
{
"name": "CVE-2011-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1172"
},
{
"name": "CVE-2011-1163",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1163"
},
{
"name": "CVE-2010-2089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2089"
},
{
"name": "CVE-2010-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0547"
},
{
"name": "CVE-2009-3720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3720"
},
{
"name": "CVE-2011-1577",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1577"
},
{
"name": "CVE-2011-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2519"
},
{
"name": "CVE-2011-1495",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1495"
},
{
"name": "CVE-2011-0711",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0711"
},
{
"name": "CVE-2011-2491",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2491"
},
{
"name": "CVE-2011-1576",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1576"
},
{
"name": "CVE-2011-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2495"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2012-0001 du 30 janvier 2012 :",
"url": "http://www.vmware.com/security/advisories/VMSA-2012-0001.html"
}
],
"reference": "CERTA-2012-AVI-046",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-02-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Un grand nombre de vuln\u00e9rabilit\u00e9s, dont certaines permettent d\u0027ex\u00e9cuter\ndu code arbitraire \u00e0 distance, sont pr\u00e9sentes dans VMware ESX et VMware\nESXi.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans VMware ESX et ESXi",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2012-0001 du 30 janvier 2012",
"url": null
}
]
}
CERTA-2012-AVI-046
Vulnerability from certfr_avis - Published: - Updated:
Un grand nombre de vulnérabilités, dont certaines permettent d'exécuter du code arbitraire à distance, sont présentes dans VMware ESX et VMware ESXi.
Description
Un grand nombre de vulnérabilités existe dans VMWare ESX et VMware ESXi dont certaines, particulièrement critiques, peuvent conduire à une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ESXi 4.1 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX 4.1.",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUn grand nombre de vuln\u00e9rabilit\u00e9s existe dans VMWare ESX et VMware ESXi\ndont certaines, particuli\u00e8rement critiques, peuvent conduire \u00e0 une\nex\u00e9cution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1170"
},
{
"name": "CVE-2010-1634",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1634"
},
{
"name": "CVE-2010-2059",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2059"
},
{
"name": "CVE-2011-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2901"
},
{
"name": "CVE-2011-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2694"
},
{
"name": "CVE-2011-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2213"
},
{
"name": "CVE-2010-4649",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4649"
},
{
"name": "CVE-2009-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3560"
},
{
"name": "CVE-2011-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1494"
},
{
"name": "CVE-2011-1044",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1044"
},
{
"name": "CVE-2011-3378",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3378"
},
{
"name": "CVE-2011-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2022"
},
{
"name": "CVE-2011-1080",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1080"
},
{
"name": "CVE-2011-1746",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1746"
},
{
"name": "CVE-2011-0695",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0695"
},
{
"name": "CVE-2011-2522",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2522"
},
{
"name": "CVE-2011-1745",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1745"
},
{
"name": "CVE-2011-1780",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1780"
},
{
"name": "CVE-2011-1078",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1078"
},
{
"name": "CVE-2010-3493",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3493"
},
{
"name": "CVE-2011-1776",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1776"
},
{
"name": "CVE-2011-1171",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1171"
},
{
"name": "CVE-2011-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1936"
},
{
"name": "CVE-2011-1678",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1678"
},
{
"name": "CVE-2011-1593",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1593"
},
{
"name": "CVE-2011-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1182"
},
{
"name": "CVE-2011-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1093"
},
{
"name": "CVE-2011-2517",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2517"
},
{
"name": "CVE-2011-1521",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1521"
},
{
"name": "CVE-2011-1763",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1763"
},
{
"name": "CVE-2011-2192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2192"
},
{
"name": "CVE-2011-0726",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0726"
},
{
"name": "CVE-2011-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1015"
},
{
"name": "CVE-2011-2492",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2492"
},
{
"name": "CVE-2011-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1079"
},
{
"name": "CVE-2011-2525",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2525"
},
{
"name": "CVE-2011-2482",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2482"
},
{
"name": "CVE-2011-1573",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1573"
},
{
"name": "CVE-2011-1166",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1166"
},
{
"name": "CVE-2011-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2689"
},
{
"name": "CVE-2010-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0787"
},
{
"name": "CVE-2011-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1172"
},
{
"name": "CVE-2011-1163",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1163"
},
{
"name": "CVE-2010-2089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2089"
},
{
"name": "CVE-2010-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0547"
},
{
"name": "CVE-2009-3720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3720"
},
{
"name": "CVE-2011-1577",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1577"
},
{
"name": "CVE-2011-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2519"
},
{
"name": "CVE-2011-1495",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1495"
},
{
"name": "CVE-2011-0711",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0711"
},
{
"name": "CVE-2011-2491",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2491"
},
{
"name": "CVE-2011-1576",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1576"
},
{
"name": "CVE-2011-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2495"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2012-0001 du 30 janvier 2012 :",
"url": "http://www.vmware.com/security/advisories/VMSA-2012-0001.html"
}
],
"reference": "CERTA-2012-AVI-046",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-02-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Un grand nombre de vuln\u00e9rabilit\u00e9s, dont certaines permettent d\u0027ex\u00e9cuter\ndu code arbitraire \u00e0 distance, sont pr\u00e9sentes dans VMware ESX et VMware\nESXi.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans VMware ESX et ESXi",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2012-0001 du 30 janvier 2012",
"url": null
}
]
}
FKIE_CVE-2011-1577
Vulnerability from fkie_nvd - Published: 2011-05-03 19:55 - Updated: 2026-04-29 01:13{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F68ABAD0-43FB-4476-A98D-CD8A403D495F",
"versionEndIncluding": "2.6.38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142BCD48-8387-4D0C-A052-44DD4144CBFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E8220D81-9065-471F-9256-CFE7B9941555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2C14A949-E2B8-4100-8ED4-645CB996B08A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "81941077-0011-4272-A8C7-21D0AFE7DECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EB445E3E-CCBD-4737-BE30-841B9A79D558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9B2EDDD7-5B3E-45AA-BC42-A6FF516B8F57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "02F89C7A-24F2-4518-A605-78A5B7056A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "2C43BA02-0686-42F0-B901-4CB88459E2D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5301E27-8021-467C-A9A2-AF2137EF0299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "59393187-1D1E-45CD-BE0E-385F978E4834",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D0CCDF6B-0365-4553-B161-3F6D68A58F72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A9B2BB71-0489-40F6-9CB6-A95B96E92106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*",
"matchCriteriaId": "842ECCE2-60F0-41C0-9EAA-A43AF97F61AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "79787868-2D77-4B55-AD61-C2B357CCE047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "05F0391C-D4CC-4652-A24C-DC47F4C3DC91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "56340FF9-EE77-4EB3-9720-240FAAEF39F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*",
"matchCriteriaId": "79EB0E94-6AE8-4703-96BD-B927E0F2893F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8A1F1242-0F07-4D81-9175-3BA5B2C7B564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*",
"matchCriteriaId": "3ECBCF2E-95B3-4BE9-9B93-6390AB578C7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1CF4EC75-06A2-4BD4-A39A-183F00C46E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A0934C49-5F88-4189-BD88-2F32C39C2F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DFC3618C-FBE8-4F7C-BECE-F2CDDF785599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A6501752-2595-4412-9140-C78EB9FD41CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
"matchCriteriaId": "14B0A230-4054-4483-A3A7-9A5A286C7552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D78F881-DB3A-423A-8DAD-314645B2B3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*",
"matchCriteriaId": "D77D4CC4-7008-4E6F-A8CA-62DA244BB3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F90242EF-048B-4539-AA41-87AA84875A9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
"matchCriteriaId": "3C4E9325-2A70-4E15-9AAF-5588BF218055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
"matchCriteriaId": "01402A85-B681-4DE0-B7BB-F52567DA29E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*",
"matchCriteriaId": "70D1E088-5A9B-4CBF-A4FF-969201942CCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "455E647F-73DD-400A-AA19-3D93FE2E57AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B812DFE2-6FFA-4D31-839C-0CCB2B1310EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FC106BDA-2EA4-41A2-AA01-6352A5C255B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB515243-7519-4CA4-9267-D9A6798CBC49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "B672E1B6-E8E9-473F-853F-906EA56D712E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2CDE1E92-C64D-4A3B-95A2-384BD772B28B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9F727CD3-D3C2-4648-9EC5-092DF3F73B13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4B130EB7-A951-4717-A906-E2F602F7B69F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "D1765065-ABE5-478C-9ACC-EFFA8E4A7043",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9D90502F-EC45-4ADC-9428-B94346DA660B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D8DE0233-BE28-4C0A-B9FB-2157F41F8D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2422569B-02ED-4028-83D8-D778657596B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E66E4653-1A55-4827-888B-E0776E32ED28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6C8994CB-7F94-43FB-8B84-06AEBB34EAE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "95DD4647-564E-4067-A945-F52232C0A33A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD39A7A-9172-4B85-B8FE-CEB94207A897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "81DE32C2-5B07-4812-9F88-000F5FB000C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "02EED3D5-8F89-4B7F-A34B-52274B1A754F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5F87AA89-F377-4BEB-B69F-809F5DA6176C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C27AF62E-A026-43E9-89E6-CD807CE9DF51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "79C2AE0E-DAE8-4443-B33F-6ABA9019AA88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D343B121-C007-49F8-9DE8-AA05CE58FF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7936B7EE-9CD1-4698-AD67-C619D0171A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3A0370A2-0A23-4E34-A2AC-8D87D051B0B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5738D628-0B2D-4F56-9427-2009BFCB6C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F43EBCB4-FCF4-479A-A44D-D913F7F09C77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "169446DE-67F8-4738-91FE-ED8058118F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4F76C298-81DC-43E4-8FC9-DC005A2116EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0AB349B2-3F78-4197-882B-90ADB3BF645A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6AC88830-A9BC-4607-B572-A4B502FC9FD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"matchCriteriaId": "476CB3A5-D022-4F13-AAEF-CB6A5785516A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8CFD5CDD-1709-44C7-82BD-BAFDC46990D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "860F9225-8A3F-492C-B72B-5EFFB322802C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "57E23724-2CA4-4211-BB83-38661BE7E6AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6143DC1F-D62E-4DB2-AF43-30A07413D68B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "93F0834D-C5EA-4C96-8D6C-3123ECF78F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F1784CBC-BEAF-48E5-95A4-2A4BD5F9F1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "31523E67-5E4F-43F7-9410-20CB3F287DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "5D9F976B-1328-40FE-A1F2-C1DF3F836604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "9B627DE3-2702-4EB2-9733-253D315FB594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "10E1B011-8D20-448E-9DD5-023DD30D1FE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*",
"matchCriteriaId": "2A29A4BC-0442-458E-A874-BF0D0F2870FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "298266AB-2A36-4606-BF80-2185FC56C4D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2658CA-56C2-494F-AC42-618EC413CBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD34526D-F2CC-44C5-991D-B1E41C327860",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F0B900-34E9-4545-B7AE-AF0A4363EACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B36F432D-FED1-4B8D-A458-BEDEEF306AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "04F25DE0-CA8E-4F57-87A5-C30D89CC9E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F87F764B-4097-44FA-B96E-A5DA75E31F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "D7025803-C679-44DB-ADEE-864E6CAAD9B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "24B879D6-4631-49A8-9366-75577DFB755D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "C5B76C21-70C8-4911-A24B-270F876EF7C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "25379B32-D898-4E44-A740-978A129B5E05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B90F8F2-9549-413D-9676-3EF634D832B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "915E64EF-6EEC-4DE2-A285-5F3FCE389645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "585BEE46-088A-494E-8E18-03F33F6BBEA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF35478-B292-4A00-B985-CEEDE8B212C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6E85846A-61BE-4896-B4A6-42A7E1DBA515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D6E3B925-031D-4F6D-915A-A16F0FFA878C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7344B707-6145-48BA-8BC9-9B140A260BCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*",
"matchCriteriaId": "390B1E09-7014-4A74-834C-806BBEBAF6F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FEF02479-2124-4655-A38D-A4793D3B8A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0FB5CF04-B5B6-4DFB-B051-61EDA257019F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A89DC9CD-C06F-4B9B-B376-900E65016296",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*",
"matchCriteriaId": "15BED7A7-3E96-43EF-8B6F-3C94897C3AA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8C6FCAC4-B6C6-4125-B3AC-F30407AA7738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*",
"matchCriteriaId": "707ECC75-65B6-4B02-BE85-A4804549A2DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFCEA98-C708-4E1E-B189-E6F96D28F07A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B753112-CCDE-4870-AA97-4AAA2946421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "79B3AFE7-F4FF-4144-9046-E5926E305A03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7616E197-ACCA-4191-A513-FD48417C7F88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE2F94D-E8E0-4BB7-A910-378012580025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"matchCriteriaId": "66F5AE3B-B701-4579-B44A-0F7A4267852E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "34E60197-56C3-485C-9609-B1C4A0E0FCB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D1369C4A-EF3B-4805-9046-ADA38ED940C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "CC3639E1-B5E4-4DD6-80D4-BA07D192C42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*",
"matchCriteriaId": "54393D69-B368-4296-9798-D81570495C6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6791A801-9E06-47DD-912F-D8594E2F6B3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*",
"matchCriteriaId": "AE90CCED-3A5B-46E3-A6B0-4865AB786289",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*",
"matchCriteriaId": "CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "86E452E4-45A9-4469-BF69-F40B6598F0EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5751AC4-A60F-42C6-88E5-FC8CFEE6F696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "48777A01-8F36-4752-8F7A-1D1686C69A33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"matchCriteriaId": "42DA6A18-5AA1-4920-94C6-8D0BB73C5352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"matchCriteriaId": "992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E51F0211-2D3E-4260-AD63-E83AE4EC4AF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4E1245-C6BB-462C-9E27-C608595DAE3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "747F1324-AEFA-496F-9447-12CD13114F60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"matchCriteriaId": "795C3B17-687E-4F33-AA99-8FEC16F14693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"matchCriteriaId": "190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6B81A4DD-2ADE-4455-B517-5E4E0532D5A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD589CC-666B-4FAA-BCF0-91C484BDDB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD622EE-A840-42E1-B6BF-4AA27D039B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"matchCriteriaId": "900D6742-DE0F-45C5-A812-BF84088CB02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"matchCriteriaId": "225CA94C-8C84-4FA6-95D0-160A0016FBFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"matchCriteriaId": "D88ED3C4-64C5-44B2-9F23-E16087046C40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"matchCriteriaId": "03FB31E5-190C-489A-AB30-910D2CC854F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"matchCriteriaId": "EF4A781A-4A41-466F-8426-10B40CF8BA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED29B3F-456B-4767-8E59-8C19A3B7E1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F6316369-B54A-4E59-A022-E0610353B284",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"matchCriteriaId": "073C3CE0-E12D-4545-8460-5A1514271D50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"matchCriteriaId": "670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB33DEA-13C7-4B36-AB8A-ED680679A071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"matchCriteriaId": "86DD0FCC-BB12-410D-8C82-AB99C7C5311E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"matchCriteriaId": "83700989-8820-48DA-A9FE-6A77DF1E8439",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"matchCriteriaId": "CC9F4CEC-7781-468B-B460-4F487B7C6601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"matchCriteriaId": "67C75A62-8807-4821-9362-1E0D63C0A1B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"matchCriteriaId": "894D4812-D62F-489E-8D0E-5E9468CE8EC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92E01-4F08-4364-9E87-FFBC095E32E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"matchCriteriaId": "F9960640-F02D-4E81-A34B-1893D8FD7F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"matchCriteriaId": "D9D00DAD-4F2D-45C7-B87C-85118D9DD855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"matchCriteriaId": "0C398D26-7132-4A6E-9003-77246644451B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"matchCriteriaId": "5EED2DA2-2516-42E9-8A33-0FA64BF51DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"matchCriteriaId": "FF425F00-41BA-4F59-A0DE-6362A1E9A142",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"matchCriteriaId": "33577E79-1B6E-406D-A49B-2CEF1754F5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"matchCriteriaId": "8B21D90E-5172-485E-87AC-F1681604AD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"matchCriteriaId": "C41F6822-92BF-43F5-8B3E-8BAF9E9A320D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"matchCriteriaId": "641EECFD-A985-4026-A53A-10FBE47EAD91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"matchCriteriaId": "47595F81-2083-4236-A0B0-E2B98DD78402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*",
"matchCriteriaId": "8F5FC758-5A5D-466A-8386-5FC469F79F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*",
"matchCriteriaId": "0CCA5C83-5293-4107-8E6A-85F82ECF2C80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D0AADC-BC34-40FB-BD69-37981DC8E971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*",
"matchCriteriaId": "3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*",
"matchCriteriaId": "12547B6B-78F1-4426-81CE-5F208794658C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*",
"matchCriteriaId": "38429E64-276B-46D4-AACD-05349D6F6615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*",
"matchCriteriaId": "E89640F8-313B-4A36-A591-36645D1EF838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*",
"matchCriteriaId": "CE0271F0-41F2-4096-8C91-DAD1A81AF855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*",
"matchCriteriaId": "7A40DCBB-B41B-468E-A918-6EA3F9A125E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*",
"matchCriteriaId": "921B6A54-85E3-4867-8EDF-93EB86BAFBD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*",
"matchCriteriaId": "2B004CF1-0ACC-441C-9F61-9B20504F4ECC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*",
"matchCriteriaId": "04B42F06-AC6D-40F3-BC03-5126BED48F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*",
"matchCriteriaId": "0A8002C7-19E2-4F20-890E-4BA2029174D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*",
"matchCriteriaId": "34FC90C2-AED0-4EAF-B5E8-DE75961DA26E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DA9C54-742C-4057-8BAB-18755B4A42D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*",
"matchCriteriaId": "84BBE8BE-EAE8-4F7A-85BD-94BBF64F30EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*",
"matchCriteriaId": "53037B40-D534-41D1-9895-8EDB0D884C3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*",
"matchCriteriaId": "5549096F-C640-463E-AD07-FD8D254CC098",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*",
"matchCriteriaId": "F8DCAF19-879C-42BB-B56A-84504E79758A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8ED186-B0FE-4AAC-9B20-DFAD75D7F677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9E86E13B-EC92-47F3-94A9-DB515313011D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "980A6C7D-6175-4A44-8377-74AA7A9FD108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5C226902-04D9-4F32-866C-20225841ECF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*",
"matchCriteriaId": "655DB612-AF49-4C17-AFB9-2E33EE8E0572",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"matchCriteriaId": "7EE30F34-EE81-4E1E-BF9F-A7A36B78B897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*",
"matchCriteriaId": "E1F65DF2-2794-47B7-9676-CCF150683CC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6555D45B-D3B3-4455-AB1E-E513F9FB6139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA5E262-7825-496F-AA72-0AD6DE6F3C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "56C6C01B-4CED-4F37-A415-0603496C27DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3ACE7A-A600-4ABB-B988-5D59D626DC0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2F839622-3DE1-4A16-8BD2-5FA2CBF014D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DC47887B-5608-47BE-85EE-563864461915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AF39E62B-EAB4-44B0-A421-2A71B7DD8341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"matchCriteriaId": "809264F1-763D-4A8F-B206-222332DD8732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A66ED53E-3139-4972-B027-D614BFFB8628",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"matchCriteriaId": "85A3AB7A-1959-4A57-B83D-B2753C43649E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4A60B265-5508-4EE0-980A-44BB0966FD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C06F0037-DE20-4B4A-977F-BFCFAB026517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1817C772-D367-4ABE-B835-466D31A6DC89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C667B8E4-64EB-4A05-84FF-B2243DEF757D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9484B41A-DFB6-4481-80D8-440C711CEA53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"matchCriteriaId": "53D373AF-DE6B-428E-9F0F-F1D220900A4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"matchCriteriaId": "F2975DF7-F916-456C-BF7C-2694559E5282",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"matchCriteriaId": "6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"matchCriteriaId": "784EB96E-2FD3-4F77-8DB6-4D6C7A928946",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D08CBC56-C820-4513-ABEC-1ABB3EFC3A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "338BB401-8831-4094-9186-2B3CFA5903D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E32E6BA-AFEF-44A8-B230-87DD043BB222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F69E575B-BD1A-4E50-8D6F-131D5E08058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20F6269B-5F6B-4413-B14D-7AE5442E4CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "189D1246-F975-4411-A58B-343ED90485FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1B914F7F-C6BD-4527-B1E9-7FD1E337A18C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"matchCriteriaId": "82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"matchCriteriaId": "179147E4-5247-451D-9409-545D661BC158",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8D97ED16-D6B7-4445-889C-4D6DE2EDC49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "DFFB2843-A867-48EC-97D7-B106C7BBAED0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "3CD3FE23-1A10-47E6-AD7E-D67F1BE3C5E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "9F39FC76-7D77-4064-94D3-A16C436FA8D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6554469E-F6AE-4EB0-880E-CBFD196FEE31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C20367B0-F722-4442-8B59-ABB0FEDB8CC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "86A98A70-51E3-4556-8DC4-DD09CF370D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "469EE3B0-3CC2-4AC2-86A0-2DF34205E707",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8EC547EB-9308-4477-8256-A0E04B42D6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"matchCriteriaId": "C6940324-0383-4510-BA55-770E0A6B80B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc1:*:*:*:*:*:*",
"matchCriteriaId": "228657B0-0CDF-4D02-B2CD-0C43063BF51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB1E1A8B-6FA1-45AD-B034-EC34884527DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc3:*:*:*:*:*:*",
"matchCriteriaId": "D2684C91-2291-4144-B482-E7816C2A3CD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc4:*:*:*:*:*:*",
"matchCriteriaId": "91B1D523-89F6-4010-9F8D-430083131730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc5:*:*:*:*:*:*",
"matchCriteriaId": "15039537-3667-4F88-84AF-7526C2625571",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc6:*:*:*:*:*:*",
"matchCriteriaId": "99071C5B-0D2B-401E-B924-D0C64F66B048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C5330C89-3C98-4003-A989-A232B30BBDBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3313D5-52E8-49B3-B145-170D9A26DA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3A5FD5-4C42-4B00-8473-D5650FAED9C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "480F035A-A59D-4113-A246-DF108BB2F591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30D39E29-B2A0-4075-84AF-994C27AB0A68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19879317-B067-45DA-B497-21EBDDDC2521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D220C745-28AD-4D04-B2D2-A090D229206E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E4AF8895-7BF8-458E-B2BB-68699AABC023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CA768A9D-6C63-405E-9D14-5D68F8E93A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FF495E58-DA6C-402D-B381-4929CB8A502B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A591301C-C30F-44AC-90F0-709A18AA96E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F7D2606B-00A6-4FA3-A00D-B1E8A80B947C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"matchCriteriaId": "610A93BB-70E3-4BF1-83E8-8A7388477F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"matchCriteriaId": "821BD11F-3C6A-4424-BC9B-DFD786248B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6F55A024-9F8E-44F8-A0D8-696BC232524A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"matchCriteriaId": "84595143-3B04-4CE8-81C0-28EEEC58CD0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"matchCriteriaId": "32EE2B49-DDEB-4B49-A5F0-CAA161095A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C3ABFA33-8FA1-488E-A9BD-1593F495F595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"matchCriteriaId": "62F6DE3A-E6CC-4D7E-BD08-E43DC4182200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"matchCriteriaId": "50B422D1-6C6E-4359-A169-3EED78A1CF40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*",
"matchCriteriaId": "08A6E33E-5847-45DA-B9C9-79A7C5C877D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B1F60C33-3CEA-45F0-97FA-18C029270190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*",
"matchCriteriaId": "247E13CB-9B11-4B64-80AD-C0F8482CCC0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*",
"matchCriteriaId": "903FE5D3-A9FB-466D-833B-448233BB0803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*",
"matchCriteriaId": "958EDC43-0848-4D93-9D07-6A085A5940B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*",
"matchCriteriaId": "AD35F21D-0A28-4C14-BCF5-8EDA760701C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*",
"matchCriteriaId": "3AAD8BE9-A05B-40E8-80DF-0B2878968BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F19064-CFBF-4B3C-A0A1-CE62265CD592",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AB759752-DC19-4750-838B-056063EFDC5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96A43C95-8569-40BE-9E5B-F9B3D0B9D188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"matchCriteriaId": "99662904-E5E3-4E81-B199-39707EAEB652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"matchCriteriaId": "615BDD1D-36AA-4976-909B-F0F66BF1090C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2AAA75FD-FBF0-4D0D-9485-9CC19559DD66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc2:*:*:*:*:*:*",
"matchCriteriaId": "053D359F-F2DA-47DB-9DD1-B49811DFF620",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc3:*:*:*:*:*:*",
"matchCriteriaId": "39CBD1BA-B8A9-404D-9E94-5E643EE313CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6465E61D-0238-4ED3-B4CB-E3B93F4F324F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc5:*:*:*:*:*:*",
"matchCriteriaId": "830B8340-2B8F-4F0A-8943-F4413411573C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*",
"matchCriteriaId": "D123AAFE-3F17-45C4-9382-BA392FD022C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc7:*:*:*:*:*:*",
"matchCriteriaId": "E0C256E6-2691-4478-A51C-DE580A717AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8A26D6-1BDA-45F0-8F7C-F95986050E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61A3EDF2-09D7-4116-AE46-D86E4B9602AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F320FA9F-C13D-4AA3-B838-A0E5D63E6A29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B179CF1D-084D-4B21-956F-E55AC6BDE026",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1B4877-286A-44B5-9C5C-0403F75B2BAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "432CA976-6EFA-4D34-B5EA-CD772D067F93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6E476195-657E-416E-BC16-44A18B06A133",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"matchCriteriaId": "12A55028-B8F9-4AD2-AE57-A80D561F3C79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0C4E641C-67D4-4599-8EFB-0B2F8D81D68C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"matchCriteriaId": "70460F6C-D6C0-4C1A-B13E-368705EAF223",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3F26BA18-08AD-45FE-9F83-25CCB2E27270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBFF148-3EDA-4216-910B-8930D8C443C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"matchCriteriaId": "648C63F7-EA1D-4F2E-B8AF-1F380C83E542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1697B855-4834-4633-A5C8-C1F7F13ACE0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBAE75F-9145-4B9A-A6D8-E488C5326145",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"matchCriteriaId": "DFF566DA-0F04-48DA-AA40-565979C55328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"matchCriteriaId": "5990C6C2-2F66-4C4D-8224-74163865F410",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"matchCriteriaId": "3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C23AD176-3B99-4593-BCBD-13C1E579A13E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*",
"matchCriteriaId": "034DFD7F-8919-4245-8480-7B272F591271",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEBC606-6488-48CE-8AA8-5B8CC724D5D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A83C60AF-50A9-480E-860D-45E80AC0A6B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0E249774-CE05-43D5-A5A3-7CCE24BB2AD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8D42BA44-C69B-4170-9867-CABF93CA9BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc3:*:*:*:*:*:*",
"matchCriteriaId": "B6BCD075-9FCE-496C-9807-3A13998129B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc4:*:*:*:*:*:*",
"matchCriteriaId": "460BC48C-1598-4739-A64B-A2350BC6BD28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc5:*:*:*:*:*:*",
"matchCriteriaId": "7700AB42-8543-4FA5-9BAF-EF2F126E9375",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B8C31F2D-385F-46CF-8F04-61157EE35013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc7:*:*:*:*:*:*",
"matchCriteriaId": "3588EB36-674F-49FB-A51C-0B52F8BFD9D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc8:*:*:*:*:*:*",
"matchCriteriaId": "3C93A9E4-08DA-44D2-B6D9-76BD287FA5DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc9:*:*:*:*:*:*",
"matchCriteriaId": "C5575728-D466-4CC9-95BA-8CA433D19566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5140380C-71BD-464F-AE53-1814C2653056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B18EC0A7-8616-4039-B98B-E1216E035B05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"matchCriteriaId": "22FB141B-FA2A-435D-8937-83FC0669CB20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C59131C8-F66A-4380-9F6E-3FC14C7C8562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5421616-4BF5-4269-8996-C3D2BA6AE2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"matchCriteriaId": "23FC6CE2-8717-4558-A309-A441D322F00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"matchCriteriaId": "311BE336-7BB2-47C0-AED5-3DEA706C206F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CE87D1BC-A72D-42D2-A93C-67A5823BEB14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5AAC2E9D-0E82-4866-9046-ADD448418198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"matchCriteriaId": "760FB32D-9795-4B29-B79A-A32B5E70F7EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5881A78C-D162-4DE5-8353-2BB1EC1F428B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B13D81D2-1A89-4E61-A90C-5E8BB880310B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"matchCriteriaId": "67F2047A-5F17-4B59-9075-41A5DC5C1CD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
"matchCriteriaId": "80F9887E-2466-4C73-A8E1-2117492F9EC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDE5B27-2EF0-464E-8F14-5E809D84D389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
"matchCriteriaId": "815B2EE8-136F-44E4-997D-5F93A54775DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
"matchCriteriaId": "13673DF5-09B1-40C8-AC54-A447DE8AB01E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*",
"matchCriteriaId": "085259B8-9D41-42B0-B32B-66B8D365F106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*",
"matchCriteriaId": "9A12DE15-E192-4B90-ADB7-A886B3746DD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*",
"matchCriteriaId": "FF6588E7-F4FA-40F5-8945-FC7B6094376E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*",
"matchCriteriaId": "AE87E13E-ACF7-4F74-8938-729F3B0D694C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*",
"matchCriteriaId": "D4965A12-1BBA-4494-A5C1-43E0C0F48C14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B7A18909-B468-4A5C-8DCC-2690F1F1D6C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc7:*:*:*:*:*:*",
"matchCriteriaId": "AEFCCCBD-B3EA-4A78-BEF9-6BD4793AAE10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc8:*:*:*:*:*:*",
"matchCriteriaId": "F8AF0C46-6BF2-46A3-8AD8-1E521E736169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52152F5A-1833-4490-A373-9C547B90B0F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B64A095E-5E97-445E-B435-F09983CC0E7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE92406-DBF3-463E-8A51-F9679E851FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3C60D19B-ED9B-443C-9D49-002ABD381119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
"matchCriteriaId": "264C61EE-64F6-43AD-B54F-7D683C29E64F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0149408A-30F6-4EDF-8B3B-CBAB884CE758",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
"matchCriteriaId": "71295664-89EC-4BB3-9F86-B1DDA20FAC5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc1:*:*:*:*:*:*",
"matchCriteriaId": "DC2C3D3E-3765-423F-B41B-35096E5154A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DDCD92E0-2C08-429B-BB00-BAAB1B5FD79C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C19C7509-16AD-47C3-B984-A350D8F1C87B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc4:*:*:*:*:*:*",
"matchCriteriaId": "17593F6C-75DA-4936-8AC3-81631A715DD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc5:*:*:*:*:*:*",
"matchCriteriaId": "C6113F66-4F25-4302-9986-D75532F59E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00763CAF-AEF8-4EF1-9393-DEFF9697D382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc7:*:*:*:*:*:*",
"matchCriteriaId": "2D5310FC-8432-4BBF-8174-60F7B8A608B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc8:*:*:*:*:*:*",
"matchCriteriaId": "4254F56E-6BA0-45DD-95D1-61A7C8AF7BA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc9:*:*:*:*:*:*",
"matchCriteriaId": "8957EE27-E19A-4DE6-B46D-FE413E88BD93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
"matchCriteriaId": "37BE853A-BA6F-4A70-B166-E34441F0B7DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85064FDF-4B62-43BF-B36C-F659D739BC22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CEADC505-FF44-4D45-8EA6-B23A1C4564D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0CE3C807-5C9B-4B71-868B-DF17ECB1514F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
"matchCriteriaId": "45B6847C-873B-4BE1-852D-239115E59BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FF41209E-D27F-4642-A405-90E822A41897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
"matchCriteriaId": "97F59FD9-46E5-4F63-80A0-091AD44D1867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
"matchCriteriaId": "428844A5-E020-4AE9-8012-9AEDFCB7C32E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
"matchCriteriaId": "94C9D70D-A552-48D6-9497-EE07EB5649D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AF6169FF-9FF9-4A81-BAEB-6D5132F64F61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E6DC79CF-A504-4232-9F66-B5DCD0213DA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
"matchCriteriaId": "192B4273-0935-4232-BBFD-A850855CAC5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
"matchCriteriaId": "60E9FDA8-7EC3-4B9B-B508-27F948D60DDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E4E4A6E5-0C2C-42FD-B982-684CCB0DDFBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*",
"matchCriteriaId": "A16F2182-C489-4CA9-A56B-01463148D16F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*",
"matchCriteriaId": "630A56D3-7A82-44DE-8888-2EB8CD1C24A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0D6431-E8E0-4079-A1A0-9CE6D1D67709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*",
"matchCriteriaId": "BF4EF7A7-6E96-43B4-8287-368098ABBFA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF91995-A084-422A-A544-30B0B4D75E22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*",
"matchCriteriaId": "E45F4429-5A9C-4E8B-96EE-CCF19776CABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FA5634BC-FBAD-4B96-A88E-282E4F97A286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc2:*:*:*:*:*:*",
"matchCriteriaId": "285DF725-52A0-4087-BC0D-32A0817CCB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc3:*:*:*:*:*:*",
"matchCriteriaId": "2B2BB4B5-0553-4150-AE64-1E52865C5B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc4:*:*:*:*:*:*",
"matchCriteriaId": "12D0C03A-7D30-485F-8431-638918FE9658",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc5:*:*:*:*:*:*",
"matchCriteriaId": "8B8E0DDC-7566-4EF9-9A8F-B1870CA83144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc6:*:*:*:*:*:*",
"matchCriteriaId": "764777FB-FD1E-4930-899C-AC5D2DF293E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc7:*:*:*:*:*:*",
"matchCriteriaId": "95461D7E-A080-4B9E-BC72-6BDBC1C1A447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc8:*:*:*:*:*:*",
"matchCriteriaId": "D913E879-38EC-46AE-9F20-5D3E5F2CDCC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc9:*:*:*:*:*:*",
"matchCriteriaId": "B264E869-1A6C-4D85-9944-2E4EB523CD82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1EFCAF09-BB20-424C-8648-014C0F71F8A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3A74970C-5EEA-47A7-A62D-AF98F4D1228F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CEA56669-B09E-42C2-9591-245C46909A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3D08D180-23F7-456F-98CA-26B53C678D76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*",
"matchCriteriaId": "80E3C363-49C9-4869-83B5-76C14100BFF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E1DE903-EDFC-4E0F-8EDF-7762FE3C7C80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BC02BA18-9235-45CA-A3D6-0EB21CE69DEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*",
"matchCriteriaId": "856FE78A-29B5-4411-98A0-4B0281C17EB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F8B59FCD-8161-48EF-844D-8FA1AB2FAA76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2DA311B8-D32E-4853-9B07-58EAF1019D0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F0F0F679-43C8-426E-A97E-C3B207A3331C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*",
"matchCriteriaId": "FAE6A7F3-3D04-4119-874D-DA2FA86B7BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*",
"matchCriteriaId": "BA40BC48-D6B5-4424-B306-F99E85EBBCB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*",
"matchCriteriaId": "6C2DF2BB-F94A-4692-AFDC-47C42F04081B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*",
"matchCriteriaId": "BB286B42-E739-46CD-BC96-972CFFAECB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*",
"matchCriteriaId": "7636014B-CC2A-43A3-9C9A-04B26AEB06D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*",
"matchCriteriaId": "A4ED7CE5-3388-4CB9-AF60-A2AF19611327",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*",
"matchCriteriaId": "324B5A3E-FA65-4F02-9B8F-872F38CD1808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE21E2AE-9E01-471C-A419-6AB40A49C2F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ADFC2D46-65D0-426F-9AF8-8C910AE91D49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*",
"matchCriteriaId": "11795F8E-7ACD-4597-9194-FC7241DCE057",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*",
"matchCriteriaId": "60F381E1-F3C5-49BE-B094-4D90E7B108F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D82A6217-CFA6-4E72-8BED-0297E13EABF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7954A701-1671-4080-B1E6-47E0208FD28C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*",
"matchCriteriaId": "63D06512-EAF0-48C6-98F0-066E63FF07EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7F35DA6B-C6D4-47CC-97E7-9659DCFDD162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D75B48F1-623A-4B96-9E08-4AA2DE748490",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6EB7C3-D9AB-43E7-8B78-2C36AE920935",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*",
"matchCriteriaId": "7FC87A28-C6A1-4E90-BD9F-A5BE1985DB50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0383E2A5-60EE-47F3-9DA8-BF75028D511F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B0C229-2A79-47E0-856A-2AE0FF97B967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FB27B247-D6BF-49C4-B113-76C9A47B7DCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F94BA1B0-52B9-4303-9C41-3ACC3AC1945E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*",
"matchCriteriaId": "1ACBB194-1D24-464A-B79C-44B8127EAD52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*",
"matchCriteriaId": "83E5F269-7711-447D-B798-0F5478E36299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A0138807-6313-4A3F-AB5A-4B7D4A9BE287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BA2227-F259-499D-BF50-5074B1E7DD3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*",
"matchCriteriaId": "78A896D0-032C-4467-9D57-E47E8C612704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1D4C8F-8C09-4A49-AFFD-33093AE7A437",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*",
"matchCriteriaId": "A415FECF-89CC-4D71-B1BF-6A678D32599D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*",
"matchCriteriaId": "98F77E54-5F4A-4D47-8DE8-097B4BBC7944",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*",
"matchCriteriaId": "752148FC-1594-4108-AE0F-C5145B978454",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*",
"matchCriteriaId": "09546671-E75D-4F50-9D86-DFDDAC9DC5DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC7A2D7-ACB4-4871-B7C0-02711A53DF1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*",
"matchCriteriaId": "6964925C-4394-4E82-976B-770A99E74F1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C909E-02D7-4B29-AA68-897BD0200B7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.32:*:*:*:*:*:*:*",
"matchCriteriaId": "AA036609-ADD3-4903-AB9D-E8BF81CFC776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.33:*:*:*:*:*:*:*",
"matchCriteriaId": "38F9E122-994B-4276-9FCF-A8E4D2D06D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.34:*:*:*:*:*:*:*",
"matchCriteriaId": "7A15720C-3BDF-4343-B270-2575978293EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.35:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5ADCFA-2CD8-4A00-AFEC-B84F7E0015A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.36:*:*:*:*:*:*:*",
"matchCriteriaId": "6EA2EE9B-27FD-49FE-8665-159DABA0E3C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.37:*:*:*:*:*:*:*",
"matchCriteriaId": "4C81C5F8-2224-4D84-B7C0-E18421276AFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.38:*:*:*:*:*:*:*",
"matchCriteriaId": "B44A2C76-174E-40A5-9603-3B84D0D35557",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.39:*:*:*:*:*:*:*",
"matchCriteriaId": "42ACE154-0709-4AA1-82E3-1B7F34E63187",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.40:*:*:*:*:*:*:*",
"matchCriteriaId": "3022E902-9F0D-49FF-9279-71E0E1E8A873",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.41:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF77B26-91FA-4245-BFEC-43FD021A28E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.42:*:*:*:*:*:*:*",
"matchCriteriaId": "601B4C93-9A9C-40E8-A9D0-DA9D71C745EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.43:*:*:*:*:*:*:*",
"matchCriteriaId": "FF7CE35A-87A4-4D95-86F9-211D50E30482",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.44:*:*:*:*:*:*:*",
"matchCriteriaId": "CEA8675A-A37C-4658-9D26-3359EBA277B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.45:*:*:*:*:*:*:*",
"matchCriteriaId": "00E8CB86-ECEE-4435-BEFC-B8D209B2C5AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.46:*:*:*:*:*:*:*",
"matchCriteriaId": "B373DEAE-8F8B-44AA-BAE5-3A0120A541F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.47:*:*:*:*:*:*:*",
"matchCriteriaId": "7D40063F-13D0-4897-AE71-1C7B617C8855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.48:*:*:*:*:*:*:*",
"matchCriteriaId": "AC7E89C8-CF89-4FA8-A9F1-F0B415E5FE10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.49:*:*:*:*:*:*:*",
"matchCriteriaId": "4034EFE6-449D-4749-9265-B47D44AA4EC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.50:*:*:*:*:*:*:*",
"matchCriteriaId": "1F835D17-ACF9-4AE6-8C38-B74BE448B8B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.51:*:*:*:*:*:*:*",
"matchCriteriaId": "21A12676-7EBE-4D83-83BD-D46CC7A1773A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.52:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB112DB-891D-4FDB-8772-2E233A39A7BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.53:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3A0794-B10C-4DFD-9CAD-202CA1DC9250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.54:*:*:*:*:*:*:*",
"matchCriteriaId": "76E86CE6-CD1C-4412-939F-B45867068D44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.55:*:*:*:*:*:*:*",
"matchCriteriaId": "1F6896A4-16E0-46B6-B90C-5C002C526478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.56:*:*:*:*:*:*:*",
"matchCriteriaId": "469534AB-2D0F-4B31-8121-05A792FA9332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.57:*:*:*:*:*:*:*",
"matchCriteriaId": "C2820354-F25B-485D-9FA7-E32B38DDBB1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*",
"matchCriteriaId": "26BD805F-08EB-42EC-BC54-26A7278E5089",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3463B83B-E46F-456E-98BA-801C59AEB337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C8A1A8F2-F892-4EDC-A5DA-1BBD6993E84E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*",
"matchCriteriaId": "60EFBFAD-1AF4-49AC-A0E6-A88AB84CD919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*",
"matchCriteriaId": "05FD0767-03F3-416C-AB6D-6BC4A12220B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*",
"matchCriteriaId": "8452D554-8DEB-4265-839C-6B40CCFB56B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*",
"matchCriteriaId": "94F445F9-57A5-4453-BB5D-290349C04A80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*",
"matchCriteriaId": "62C97D20-4152-47C4-B21B-8206CF49E20A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc8:*:*:*:*:*:*",
"matchCriteriaId": "FE619C15-8D20-41F3-B1C4-5124C1CBF152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc9:*:*:*:*:*:*",
"matchCriteriaId": "F8575C9D-02D2-4BC7-AE4A-8AFAB5025599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "217715A5-E69D-45C0-B8E4-5681528C651B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A87AD66C-4321-4459-8556-3B0BA38C493A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*",
"matchCriteriaId": "87A347E0-9C0B-4674-9363-3C36DA27AC45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E0F3DF0-6BD0-4560-9A13-C6493939D8B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*",
"matchCriteriaId": "38A55F08-88A9-42D5-A2B1-8B8C0D6DED09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3975EC77-D33D-4167-91BE-08237C3EE9D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0A0F2534-C267-43D9-8365-C00CD979B052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*",
"matchCriteriaId": "27430190-EB83-43C5-9584-4F65CF65151A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*",
"matchCriteriaId": "C386B13F-9D7C-45F8-B86A-886384144A8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D48FD9D7-E775-4E26-AEBF-01A09C404D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*",
"matchCriteriaId": "89EA3CF3-0AB7-4648-96BA-25E978D2C8C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc3:*:*:*:*:*:*",
"matchCriteriaId": "92058AE0-2E52-4304-B4C6-871AB1CE42DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc4:*:*:*:*:*:*",
"matchCriteriaId": "C41EF454-F2F4-4B85-BF76-9CC52A087AF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc5:*:*:*:*:*:*",
"matchCriteriaId": "9114A0F3-C729-44D8-AB8A-9078DCD43C51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc6:*:*:*:*:*:*",
"matchCriteriaId": "9B630045-5F5B-422B-9947-D899599146F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc7:*:*:*:*:*:*",
"matchCriteriaId": "5ADBCB22-86AE-487D-8C52-86DFE6B5E9C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc8:*:*:*:*:*:*",
"matchCriteriaId": "BF46B929-FA99-4BF7-97FC-0F795CD511A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*",
"matchCriteriaId": "04BCABEB-DE2A-4C85-BFD5-7A1318479ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A67A63E8-837E-4162-999E-3B3DAAE57C96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A701E87D-B807-426E-9CD4-6721DBCABE19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*",
"matchCriteriaId": "66F6E506-EC0A-4784-BDA3-B7B5CD938B92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFA0277-B491-4BB1-88DC-85362F0A689C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BE922924-6496-4D24-94A6-8EDD431A4568",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*",
"matchCriteriaId": "10E55450-F6D9-483C-9CC8-E651E5A12AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*",
"matchCriteriaId": "45273823-29EA-44DE-8444-3933402C5793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*",
"matchCriteriaId": "88F60E74-09DB-4D4A-B922-4A46EED0EC20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E242D3DE-D1DC-406A-BCC3-C4380B7EC369",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:*:*:*:*:*:*",
"matchCriteriaId": "5EE58B00-70BB-493D-ACDE-77F486984392",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*",
"matchCriteriaId": "8598D6E5-0C5C-4A31-841A-C12801DB7D91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*",
"matchCriteriaId": "59800B0A-477B-42F8-A58A-5144F455AE01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc7:*:*:*:*:*:*",
"matchCriteriaId": "65210718-2AF2-47E5-A1A7-CE72B926F9F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc8:*:*:*:*:*:*",
"matchCriteriaId": "724E1180-5A91-4503-8723-C59528794884",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*",
"matchCriteriaId": "99AC6D46-A0BF-4F1D-88BB-03BF74FDB84F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CC40B6DE-09D9-422B-965B-7EB9F6661DEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FEFB6E91-34CD-4FC5-A8E1-8F5760A9B4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*",
"matchCriteriaId": "91170B40-4D25-4E40-8F0B-DBC1AE217F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E28B8B9-B832-4D77-BE1A-BB5D8A678678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*",
"matchCriteriaId": "56DF61F4-5DA1-4D79-B6C0-0E4DB825FB3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*",
"matchCriteriaId": "468745AA-0BE5-4B22-91FA-2FD350BD2F64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*",
"matchCriteriaId": "FF208118-3534-47E5-9943-83EF165F1249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*",
"matchCriteriaId": "427E3009-A2F2-4ED2-8D1A-14938F639D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*",
"matchCriteriaId": "DD3663BD-4EF5-496C-A573-2639C9E72214",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*",
"matchCriteriaId": "C4033E0B-A3A1-4CC5-956A-AAA0FB905DDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*",
"matchCriteriaId": "29C4A364-ED36-4AC8-AD1E-8BD18DD9324D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4049867A-E3B2-4DC1-8966-0477E6A5D582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A2507858-675B-4DA2-A49E-00DB54700CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*",
"matchCriteriaId": "0A25EA55-3F1C-440C-A383-0BB9556C9508",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B2665356-4EF5-4543-AD15-67FDB851DCCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*",
"matchCriteriaId": "26E7609B-B058-496D-ACDD-7F69FBDE89E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*",
"matchCriteriaId": "210BF049-8B3C-4ACC-BF8E-2C3551477602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*",
"matchCriteriaId": "1837F32C-80D3-4E10-AE5D-E9F5A11A434E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:*",
"matchCriteriaId": "4B4E132B-A69A-4CD1-B4D9-E17C4361A3AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3151BF-4BEE-4415-ABA2-E6D40673E591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1037E899-6DB3-423D-9AD0-FE79A67E9681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E4DD2F05-F990-417A-BD6D-CD9A7EB2BD55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0634D7FE-7685-4669-8EF9-54E99683D28E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9EEEB962-0E8D-402B-989E-96875453C609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0042D9C4-7081-4DC2-A5B5-2649374B44F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9CD18FA2-677A-4934-88E6-0BB78D789875",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*",
"matchCriteriaId": "24EF19A2-A1CC-4410-8704-EF4041428383",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C9502A7E-2BFF-43A7-BF6B-ADC023BD9331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6DC9A36E-1779-49DE-83CE-B8479CA018FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*",
"matchCriteriaId": "60B18050-4720-4ACB-AEE2-DEB4BFCA7B6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*",
"matchCriteriaId": "9704C4B5-28F1-4F62-A389-8A9917E8E99D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6574F543-0B91-49A6-81FA-8142007BCD54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD7F9D0-3AE3-4687-B1C9-36AD04D96F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*",
"matchCriteriaId": "46568A0D-F374-4DAB-9B64-FCC74A9AA07B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*",
"matchCriteriaId": "C85D4E0A-14DA-4884-AF6F-A0F54304430F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*",
"matchCriteriaId": "218DE1D1-3843-4076-9AE4-70AA0FD99B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2677114B-AF05-42EB-BBC8-FA85CD631C21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*",
"matchCriteriaId": "FA8D64E1-A700-4D9E-9063-EC3CFC1A6D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1B6C0A59-556F-4579-9AD2-4ABAE01FE2CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:*",
"matchCriteriaId": "DBE3083A-0FA6-4854-8F65-05E8364B3A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:*",
"matchCriteriaId": "57F8D95D-DC49-46B3-A460-2352D7E540EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*",
"matchCriteriaId": "084A2575-E5A6-43BD-8CE5-1EF628AA9ACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*",
"matchCriteriaId": "041CE8AF-711C-496D-BDF2-B4AB655C0C8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FE192302-F569-4301-83F2-AEE020FB77B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2597A691-01B8-4FD2-AF71-D4BCC15C6F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*",
"matchCriteriaId": "533A03F0-D7C4-42EF-BAD7-2B5A9A9D68EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EDBA84AD-CB87-418B-BBF7-8E910FB8FD5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A0FA9FA7-3BE3-415B-AA06-A2401B2AD8DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A93EFB49-0195-4471-9445-DA944CD55459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*",
"matchCriteriaId": "075C2C0A-E5E7-412C-9B28-3E3363A2DF05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*",
"matchCriteriaId": "534281D8-EAEB-4E78-8835-E6BA318BE866",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*",
"matchCriteriaId": "192A8675-4413-4ADD-BF9E-DFD757C76387",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1E15D428-B54A-499D-8677-63C73A2C2934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*",
"matchCriteriaId": "8804EC33-1751-4493-98D7-B85F326ABAD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*",
"matchCriteriaId": "BC94715E-208F-421E-8FCA-81E86175C983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*",
"matchCriteriaId": "982071FC-873D-4C38-817B-F5853699135D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6B721839-AB4C-4DE7-834F-E790DE770066",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*",
"matchCriteriaId": "75965543-51D3-4809-8815-EA80BAC85C98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEC8F08-EE90-41CA-A30F-D34290168571",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.19:*:*:*:*:*:*:*",
"matchCriteriaId": "3A23998B-F0EE-4143-A206-AFD47EC8BD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.20:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB711D9-B2DE-4C8F-A03C-EFF57664416C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.21:*:*:*:*:*:*:*",
"matchCriteriaId": "5A2B2D5E-FDBC-4BCE-9925-1F6D5256C237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.22:*:*:*:*:*:*:*",
"matchCriteriaId": "5BC0D45F-8619-4EB7-B074-90CD70A4BE6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.23:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A7996C-04D2-4B0B-A1AE-E4430DE9BB80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.24:*:*:*:*:*:*:*",
"matchCriteriaId": "FD8BC35B-8304-4B11-BD48-A8633B1D97AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.25:*:*:*:*:*:*:*",
"matchCriteriaId": "44A8D565-A7EC-47CD-A72E-FBFDC6254718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.26:*:*:*:*:*:*:*",
"matchCriteriaId": "0521A4B9-8A42-41B8-AD31-BCEB90D1E58B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.32.27:*:*:*:*:*:*:*",
"matchCriteriaId": "9428FC60-D446-46C0-9305-127BCCF11E4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:*:*:*:*:*:*:*",
"matchCriteriaId": "D81C2911-5781-46A4-AD27-F946BD44EAEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2DB53511-E1B0-4F81-BE9E-B52E84E9C30E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*",
"matchCriteriaId": "207306A0-19F5-4E49-945C-A5E4DD442459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1DE43C00-5967-44A1-ACEB-B7AF66EEBB53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*",
"matchCriteriaId": "B33B5E4B-FCB3-4343-B992-F0ADB853754B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*",
"matchCriteriaId": "D7295BBE-A9E3-44F6-9DD6-0FD6C2591E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B220EA3F-55B3-4B6E-8285-B28ADEF50138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C61AB348-ACF4-4F88-AC9D-BEC63B76399C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*",
"matchCriteriaId": "C3AFD58E-A261-4398-BA11-B62A091261F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*",
"matchCriteriaId": "17721A7D-E955-407B-AACB-97F859CE79C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B04F515-29A7-4D6A-AFC5-3A115F8A5918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7514928F-8992-4B8A-8AF4-E89F1CB6EFCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BD6324B7-1329-4C6B-8DDB-D489250E07C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A7910FE5-E02C-4B20-9F27-F488E76BDE93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.6:*:*:*:*:*:*:*",
"matchCriteriaId": "96F85BC2-54C4-4450-B3BA-A2A8EB78A81C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:*:*",
"matchCriteriaId": "25E5B510-1096-42E8-8BD1-E9198D588050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:*:*:*:*:*:*:*",
"matchCriteriaId": "F9F7B49B-7CDF-426C-9688-5E990846DBF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2033D2AE-EB00-4696-B72F-8739021D1788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*",
"matchCriteriaId": "86D3F64C-3F27-43E0-B0D4-62CE1E1F4EFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*",
"matchCriteriaId": "7927713B-5EB0-41EB-86A9-9935775162E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*",
"matchCriteriaId": "59037296-3143-4FBB-AFF7-D4FE2C85502F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*",
"matchCriteriaId": "9CA27FD5-7DBF-4C85-80A9-D523B2E4B033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*",
"matchCriteriaId": "9711E333-A8E7-4F4B-BCFD-2023E889651A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*",
"matchCriteriaId": "E04D3358-973B-42A1-8E08-2E3AE947193C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B39BF614-85CD-4C6A-877C-724FB6F5B125",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD31EA80-D021-4E47-8FB0-E1F23E379EA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0C683054-0275-4A92-B003-9C9A5A03B6E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A25DDBE8-9DA5-4515-AAAF-037D4D201898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4499A795-2C87-4E0F-BFFB-63E47AE3EEB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1D11D058-0864-415A-97D6-C67BBBEB0E6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.34.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CF479FF8-8EB2-4436-89EB-FBA3EFA41184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:*:*:*:*:*:*:*",
"matchCriteriaId": "5480B0CF-B462-4172-9F6E-D94B451CF869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc1:*:*:*:*:*:*",
"matchCriteriaId": "17ACC235-F2C3-42B5-9244-DCCDC4704BA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc2:*:*:*:*:*:*",
"matchCriteriaId": "EA4BC3D2-70FF-4EED-9DC8-B378F88F4D36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A7ACC123-06D8-4A3F-8730-AA7FF6EFBD35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc4:*:*:*:*:*:*",
"matchCriteriaId": "3F6891F7-2B07-4A96-A0D6-AC528B7E0DD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc5:*:*:*:*:*:*",
"matchCriteriaId": "657BCE5D-DC8B-4BE2-AED8-BC52C738F999",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc6:*:*:*:*:*:*",
"matchCriteriaId": "160E9402-241A-44AE-A92A-9629CA656F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D2CD9FB1-AB83-427A-8923-97ED7ADFD63D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2E5B71-BF7F-426A-BE5E-0481010725E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4540D1DF-9ED8-45DB-B868-BD195DDCB8B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CB33FE45-7254-4F8D-AC22-0FEA559A8567",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.5:*:*:*:*:*:*:*",
"matchCriteriaId": "52E43E71-2F62-40E5-BF56-15D26806B7AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B422B61F-AE80-4F86-AACA-F86EE47983A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BDA2DB37-7A2D-400D-889E-36175DCDF3FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.8:*:*:*:*:*:*:*",
"matchCriteriaId": "40C2CAA9-8EAF-43C7-B0CE-D1A09663C49B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1CA35C-5F52-4095-B0EA-7A22481F4360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*",
"matchCriteriaId": "9F73DF14-B205-4345-8D2C-9F6F917C7998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*",
"matchCriteriaId": "DBE26099-6D2C-4FAF-B15C-CBF985D59171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F2C193FF-3723-4BE9-8787-DED7D455FA8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F874FE6A-968D-47E1-900A-E154E41EDAF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*",
"matchCriteriaId": "14B7B8AE-CE83-4F0E-9138-6F165D97C19F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B434ACFB-2B01-491A-B2E5-40FA0E11B3B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*",
"matchCriteriaId": "CF88CADB-AB36-4633-807B-44AB3145F748",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*",
"matchCriteriaId": "9D9830C2-0E2D-4A5A-B78F-5D4A4721B268",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc8:*:*:*:*:*:*",
"matchCriteriaId": "99DDA8A0-0A26-4379-B843-4E0B5FDD544F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36.1:*:*:*:*:*:*:*",
"matchCriteriaId": "907A3F7F-B11D-4CF1-A1B2-A28BBEBF03C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE4657B8-B691-4833-8546-220AD2BA8A7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A2455F37-66D8-4BE1-8739-1A20A2E5375D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B2976CCD-B853-4ACA-8970-CE745C73E4AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:*:*:*:*:*:*:*",
"matchCriteriaId": "18CBFC41-E9A9-456C-8A61-8DB2E6CE2E98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EA6C6E6-CAD5-4D43-AD96-66D5ACBB91CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*",
"matchCriteriaId": "71905CF7-7C7B-43AC-970D-D3187A807903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*",
"matchCriteriaId": "201421C9-E054-4FEB-A37A-8C314F242FBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*",
"matchCriteriaId": "F157225D-C62C-465D-A758-DE6A6C48C397",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*",
"matchCriteriaId": "77BB49A9-39D0-49C4-A241-D1537590F508",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1BE3273F-0DB1-4607-B92B-C0A7BC099C91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*",
"matchCriteriaId": "9BAF52C2-38F2-45C0-B6E7-7096B8A4FEEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*",
"matchCriteriaId": "13205DB7-6988-4D68-A944-B1EA3C145B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CF9A28CB-B307-4D0B-AC45-73964F766B09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37.2:*:*:*:*:*:*:*",
"matchCriteriaId": "51838021-099C-4135-94E6-EC0276BAB750",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F4EBC4-1C6D-428C-9F23-8508EBBD3588",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B86233BC-2B7D-44EB-8253-458E89046B17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37.5:*:*:*:*:*:*:*",
"matchCriteriaId": "110BB215-C869-4BEB-962D-81A1F9F896B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA72229-347A-4AAE-B75D-9C3472D347F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2DDCB342-4F5F-4BF1-9624-882BBC57330D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C3AB4113-BF83-4587-8A85-0E4FECEE7D9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*",
"matchCriteriaId": "4B57F5AD-A697-4090-89B9-81BC12993A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*",
"matchCriteriaId": "CA141BCB-A705-4DF5-9EED-746B62C86111",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*",
"matchCriteriaId": "E9ECE134-58A3-4B9D-B9B3-F836C0EDD64C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc6:*:*:*:*:*:*",
"matchCriteriaId": "56186720-6B4C-4D71-85C5-7EAC5C5D84A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc7:*:*:*:*:*:*",
"matchCriteriaId": "9BBB4630-CBED-43B9-B203-BE65BBF011AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc8:*:*:*:*:*:*",
"matchCriteriaId": "FD375A78-63D7-441A-9FB0-7BC878AB4EDD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en la funci\u00f3n is_gpt_valid en fs/partitions/efi.c en el kernel de Linux v2.6.38 y anteriores, permite a atacantes f\u00edsicamente pr\u00f3ximos causar una denegaci\u00f3n de servicio (OOPS) o posiblemente tener un impacto no especificado a trav\u00e9s de un tama\u00f1o manipulado de la cabecera de partici\u00f3n EFI GUID en un medio extra\u00edble."
}
],
"id": "CVE-2011-1577",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-05-03T19:55:12.807",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/04/12/17"
},
{
"source": "secalert@redhat.com",
"url": "http://openwall.com/lists/oss-security/2011/04/13/1"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"source": "secalert@redhat.com",
"url": "http://securityreason.com/securityalert/8238"
},
{
"source": "secalert@redhat.com",
"url": "http://securitytracker.com/id?1025355"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/517477/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/47343"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.spinics.net/lists/mm-commits/msg83274.html"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66773"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/04/12/17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://openwall.com/lists/oss-security/2011/04/13/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/8238"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1025355"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/517477/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/47343"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.spinics.net/lists/mm-commits/msg83274.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66773"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-2C8X-W9GG-X7V5
Vulnerability from github – Published: 2022-05-14 02:55 – Updated: 2022-05-14 02:55Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
{
"affected": [],
"aliases": [
"CVE-2011-1577"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-05-03T19:55:00Z",
"severity": "MODERATE"
},
"details": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.",
"id": "GHSA-2c8x-w9gg-x7v5",
"modified": "2022-05-14T02:55:50Z",
"published": "2022-05-14T02:55:50Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1577"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66773"
},
{
"type": "WEB",
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html"
},
{
"type": "WEB",
"url": "http://openwall.com/lists/oss-security/2011/04/12/17"
},
{
"type": "WEB",
"url": "http://openwall.com/lists/oss-security/2011/04/13/1"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"type": "WEB",
"url": "http://securityreason.com/securityalert/8238"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1025355"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/517477/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/47343"
},
{
"type": "WEB",
"url": "http://www.spinics.net/lists/mm-commits/msg83274.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2011-1577
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-1577",
"description": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.",
"id": "GSD-2011-1577",
"references": [
"https://www.suse.com/security/cve/CVE-2011-1577.html",
"https://www.debian.org/security/2011/dsa-2264",
"https://access.redhat.com/errata/RHSA-2011:1465",
"https://access.redhat.com/errata/RHSA-2011:1253",
"https://access.redhat.com/errata/RHSA-2011:0833",
"https://alas.aws.amazon.com/cve/html/CVE-2011-1577.html",
"https://linux.oracle.com/cve/CVE-2011-1577.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-1577"
],
"details": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.",
"id": "GSD-2011-1577",
"modified": "2023-12-13T01:19:08.317397Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1577",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "MISC",
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2011-0833.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html"
},
{
"name": "http://openwall.com/lists/oss-security/2011/04/12/17",
"refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/04/12/17"
},
{
"name": "http://openwall.com/lists/oss-security/2011/04/13/1",
"refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/04/13/1"
},
{
"name": "http://securityreason.com/securityalert/8238",
"refsource": "MISC",
"url": "http://securityreason.com/securityalert/8238"
},
{
"name": "http://securitytracker.com/id?1025355",
"refsource": "MISC",
"url": "http://securitytracker.com/id?1025355"
},
{
"name": "http://www.securityfocus.com/archive/1/517477/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/517477/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/47343",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/47343"
},
{
"name": "http://www.spinics.net/lists/mm-commits/msg83274.html",
"refsource": "MISC",
"url": "http://www.spinics.net/lists/mm-commits/msg83274.html"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66773",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66773"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=695976",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.59:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.58:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.6.38",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.31.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.37.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.32.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:rc9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:rc9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.28:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1577"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "47343",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/47343"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=695976",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"name": "[oss-security] 20110413 Re: CVE Request: kernel: fs/partitions: Corrupted GUID partition tables can cause kernel oops",
"refsource": "MLIST",
"tags": [],
"url": "http://openwall.com/lists/oss-security/2011/04/13/1"
},
{
"name": "[mm-commits] 20110412 + fs-partitions-efic-corrupted-guid-partition-tables-can-cause-kernel-oops.patch added to -mm tree",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://www.spinics.net/lists/mm-commits/msg83274.html"
},
{
"name": "[oss-security] 20110412 CVE Request: kernel: fs/partitions: Corrupted GUID partition tables can cause kernel oops",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/04/12/17"
},
{
"name": "1025355",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1025355"
},
{
"name": "FEDORA-2011-7823",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html"
},
{
"name": "8238",
"refsource": "SREASON",
"tags": [],
"url": "http://securityreason.com/securityalert/8238"
},
{
"name": "RHSA-2011:0833",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
},
{
"name": "http://downloads.avaya.com/css/P8/documents/100145416",
"refsource": "CONFIRM",
"tags": [],
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
},
{
"name": "kernel-guid-dos(66773)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66773"
},
{
"name": "20110413 [PRE-SA-2011-03] Denial-of-service vulnerability in EFI partition handling code of the Linux kernel",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/517477/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-09T19:31Z",
"publishedDate": "2011-05-03T19:55Z"
}
}
}
OPENSUSE-SU-2024:10128-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-debug-4.8.13-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-debug-4.8.13-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10128",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10128-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3939 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-4026 page",
"url": "https://www.suse.com/security/cve/CVE-2009-4026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-4027 page",
"url": "https://www.suse.com/security/cve/CVE-2009-4027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-4131 page",
"url": "https://www.suse.com/security/cve/CVE-2009-4131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-4138 page",
"url": "https://www.suse.com/security/cve/CVE-2009-4138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-4536 page",
"url": "https://www.suse.com/security/cve/CVE-2009-4536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-4538 page",
"url": "https://www.suse.com/security/cve/CVE-2009-4538/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-1146 page",
"url": "https://www.suse.com/security/cve/CVE-2010-1146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-1436 page",
"url": "https://www.suse.com/security/cve/CVE-2010-1436/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-1641 page",
"url": "https://www.suse.com/security/cve/CVE-2010-1641/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2066 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2942 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2954 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2954/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2955 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2955/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3081 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3296 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3297 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3297/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3298 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3298/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3301 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3310 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-0711 page",
"url": "https://www.suse.com/security/cve/CVE-2011-0711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-0712 page",
"url": "https://www.suse.com/security/cve/CVE-2011-0712/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-1020 page",
"url": "https://www.suse.com/security/cve/CVE-2011-1020/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-1180 page",
"url": "https://www.suse.com/security/cve/CVE-2011-1180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-1577 page",
"url": "https://www.suse.com/security/cve/CVE-2011-1577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-1581 page",
"url": "https://www.suse.com/security/cve/CVE-2011-1581/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-2203 page",
"url": "https://www.suse.com/security/cve/CVE-2011-2203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4604 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0056 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3412 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3412/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3520 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3520/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-0160 page",
"url": "https://www.suse.com/security/cve/CVE-2013-0160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-0231 page",
"url": "https://www.suse.com/security/cve/CVE-2013-0231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-0913 page",
"url": "https://www.suse.com/security/cve/CVE-2013-0913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-2850 page",
"url": "https://www.suse.com/security/cve/CVE-2013-2850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0038 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0196 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0691 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8133 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1333 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1333/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7550 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7550/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7884 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7885 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8539 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8660 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0723 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0728 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1237 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1237/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1583 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2184 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2185 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2186 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2384 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3134 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3135 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3136 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3140 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3689 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3689/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3713 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4470 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4470/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4485 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4485/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4486 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4486/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4557 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4557/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4558 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4569 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4578 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4951 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4951/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4997 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4998 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5244 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5244/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5829 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5829/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6187 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6480 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6516 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6828 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7039 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7042 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7042/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7425 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7913 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9555 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9576 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9576/"
}
],
"title": "kernel-debug-4.8.13-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10128-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-debug-4.8.13-1.1.aarch64",
"product_id": "kernel-debug-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-debug-base-4.8.13-1.1.aarch64",
"product_id": "kernel-debug-base-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-debug-devel-4.8.13-1.1.aarch64",
"product_id": "kernel-debug-devel-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-default-4.8.13-1.1.aarch64",
"product_id": "kernel-default-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-default-base-4.8.13-1.1.aarch64",
"product_id": "kernel-default-base-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-default-devel-4.8.13-1.1.aarch64",
"product_id": "kernel-default-devel-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-devel-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-devel-4.8.13-1.1.aarch64",
"product_id": "kernel-devel-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-docs-4.8.13-1.1.aarch64",
"product_id": "kernel-docs-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-docs-html-4.8.13-1.1.aarch64",
"product_id": "kernel-docs-html-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-docs-pdf-4.8.13-1.1.aarch64",
"product_id": "kernel-docs-pdf-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-macros-4.8.13-1.1.aarch64",
"product_id": "kernel-macros-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-obs-build-4.8.13-1.1.aarch64",
"product_id": "kernel-obs-build-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.8.13-1.1.aarch64",
"product_id": "kernel-obs-qa-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-pae-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-pae-4.8.13-1.1.aarch64",
"product_id": "kernel-pae-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-pae-base-4.8.13-1.1.aarch64",
"product_id": "kernel-pae-base-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-pae-devel-4.8.13-1.1.aarch64",
"product_id": "kernel-pae-devel-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-source-4.8.13-1.1.aarch64",
"product_id": "kernel-source-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-source-vanilla-4.8.13-1.1.aarch64",
"product_id": "kernel-source-vanilla-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-syms-4.8.13-1.1.aarch64",
"product_id": "kernel-syms-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syzkaller-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-syzkaller-4.8.13-1.1.aarch64",
"product_id": "kernel-syzkaller-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syzkaller-base-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-syzkaller-base-4.8.13-1.1.aarch64",
"product_id": "kernel-syzkaller-base-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"product_id": "kernel-syzkaller-devel-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-vanilla-4.8.13-1.1.aarch64",
"product_id": "kernel-vanilla-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.8.13-1.1.aarch64",
"product_id": "kernel-vanilla-base-4.8.13-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.8.13-1.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.8.13-1.1.aarch64",
"product_id": "kernel-vanilla-devel-4.8.13-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-debug-4.8.13-1.1.ppc64le",
"product_id": "kernel-debug-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.8.13-1.1.ppc64le",
"product_id": "kernel-debug-base-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.8.13-1.1.ppc64le",
"product_id": "kernel-debug-devel-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-default-4.8.13-1.1.ppc64le",
"product_id": "kernel-default-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-default-base-4.8.13-1.1.ppc64le",
"product_id": "kernel-default-base-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.8.13-1.1.ppc64le",
"product_id": "kernel-default-devel-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-devel-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-devel-4.8.13-1.1.ppc64le",
"product_id": "kernel-devel-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-docs-4.8.13-1.1.ppc64le",
"product_id": "kernel-docs-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-docs-html-4.8.13-1.1.ppc64le",
"product_id": "kernel-docs-html-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-docs-pdf-4.8.13-1.1.ppc64le",
"product_id": "kernel-docs-pdf-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-macros-4.8.13-1.1.ppc64le",
"product_id": "kernel-macros-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.8.13-1.1.ppc64le",
"product_id": "kernel-obs-build-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.8.13-1.1.ppc64le",
"product_id": "kernel-obs-qa-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-pae-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-pae-4.8.13-1.1.ppc64le",
"product_id": "kernel-pae-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-pae-base-4.8.13-1.1.ppc64le",
"product_id": "kernel-pae-base-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-pae-devel-4.8.13-1.1.ppc64le",
"product_id": "kernel-pae-devel-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-source-4.8.13-1.1.ppc64le",
"product_id": "kernel-source-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-source-vanilla-4.8.13-1.1.ppc64le",
"product_id": "kernel-source-vanilla-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-syms-4.8.13-1.1.ppc64le",
"product_id": "kernel-syms-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syzkaller-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-syzkaller-4.8.13-1.1.ppc64le",
"product_id": "kernel-syzkaller-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"product_id": "kernel-syzkaller-base-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"product_id": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.8.13-1.1.ppc64le",
"product_id": "kernel-vanilla-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.8.13-1.1.ppc64le",
"product_id": "kernel-vanilla-base-4.8.13-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.8.13-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-4.8.13-1.1.s390x",
"product": {
"name": "kernel-debug-4.8.13-1.1.s390x",
"product_id": "kernel-debug-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.8.13-1.1.s390x",
"product": {
"name": "kernel-debug-base-4.8.13-1.1.s390x",
"product_id": "kernel-debug-base-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.8.13-1.1.s390x",
"product": {
"name": "kernel-debug-devel-4.8.13-1.1.s390x",
"product_id": "kernel-debug-devel-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.8.13-1.1.s390x",
"product": {
"name": "kernel-default-4.8.13-1.1.s390x",
"product_id": "kernel-default-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.8.13-1.1.s390x",
"product": {
"name": "kernel-default-base-4.8.13-1.1.s390x",
"product_id": "kernel-default-base-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.8.13-1.1.s390x",
"product": {
"name": "kernel-default-devel-4.8.13-1.1.s390x",
"product_id": "kernel-default-devel-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-devel-4.8.13-1.1.s390x",
"product": {
"name": "kernel-devel-4.8.13-1.1.s390x",
"product_id": "kernel-devel-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.8.13-1.1.s390x",
"product": {
"name": "kernel-docs-4.8.13-1.1.s390x",
"product_id": "kernel-docs-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.8.13-1.1.s390x",
"product": {
"name": "kernel-docs-html-4.8.13-1.1.s390x",
"product_id": "kernel-docs-html-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.8.13-1.1.s390x",
"product": {
"name": "kernel-docs-pdf-4.8.13-1.1.s390x",
"product_id": "kernel-docs-pdf-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.8.13-1.1.s390x",
"product": {
"name": "kernel-macros-4.8.13-1.1.s390x",
"product_id": "kernel-macros-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.8.13-1.1.s390x",
"product": {
"name": "kernel-obs-build-4.8.13-1.1.s390x",
"product_id": "kernel-obs-build-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.8.13-1.1.s390x",
"product": {
"name": "kernel-obs-qa-4.8.13-1.1.s390x",
"product_id": "kernel-obs-qa-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-pae-4.8.13-1.1.s390x",
"product": {
"name": "kernel-pae-4.8.13-1.1.s390x",
"product_id": "kernel-pae-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-4.8.13-1.1.s390x",
"product": {
"name": "kernel-pae-base-4.8.13-1.1.s390x",
"product_id": "kernel-pae-base-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-4.8.13-1.1.s390x",
"product": {
"name": "kernel-pae-devel-4.8.13-1.1.s390x",
"product_id": "kernel-pae-devel-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-4.8.13-1.1.s390x",
"product": {
"name": "kernel-source-4.8.13-1.1.s390x",
"product_id": "kernel-source-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.8.13-1.1.s390x",
"product": {
"name": "kernel-source-vanilla-4.8.13-1.1.s390x",
"product_id": "kernel-source-vanilla-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.8.13-1.1.s390x",
"product": {
"name": "kernel-syms-4.8.13-1.1.s390x",
"product_id": "kernel-syms-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syzkaller-4.8.13-1.1.s390x",
"product": {
"name": "kernel-syzkaller-4.8.13-1.1.s390x",
"product_id": "kernel-syzkaller-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syzkaller-base-4.8.13-1.1.s390x",
"product": {
"name": "kernel-syzkaller-base-4.8.13-1.1.s390x",
"product_id": "kernel-syzkaller-base-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syzkaller-devel-4.8.13-1.1.s390x",
"product": {
"name": "kernel-syzkaller-devel-4.8.13-1.1.s390x",
"product_id": "kernel-syzkaller-devel-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.8.13-1.1.s390x",
"product": {
"name": "kernel-vanilla-4.8.13-1.1.s390x",
"product_id": "kernel-vanilla-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.8.13-1.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.8.13-1.1.s390x",
"product_id": "kernel-vanilla-base-4.8.13-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.8.13-1.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.8.13-1.1.s390x",
"product_id": "kernel-vanilla-devel-4.8.13-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-debug-4.8.13-1.1.x86_64",
"product_id": "kernel-debug-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-debug-base-4.8.13-1.1.x86_64",
"product_id": "kernel-debug-base-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.8.13-1.1.x86_64",
"product_id": "kernel-debug-devel-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-default-4.8.13-1.1.x86_64",
"product_id": "kernel-default-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-default-base-4.8.13-1.1.x86_64",
"product_id": "kernel-default-base-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-default-devel-4.8.13-1.1.x86_64",
"product_id": "kernel-default-devel-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-devel-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-devel-4.8.13-1.1.x86_64",
"product_id": "kernel-devel-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-docs-4.8.13-1.1.x86_64",
"product_id": "kernel-docs-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-docs-html-4.8.13-1.1.x86_64",
"product_id": "kernel-docs-html-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-docs-pdf-4.8.13-1.1.x86_64",
"product_id": "kernel-docs-pdf-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-macros-4.8.13-1.1.x86_64",
"product_id": "kernel-macros-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-obs-build-4.8.13-1.1.x86_64",
"product_id": "kernel-obs-build-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.8.13-1.1.x86_64",
"product_id": "kernel-obs-qa-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-pae-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-pae-4.8.13-1.1.x86_64",
"product_id": "kernel-pae-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-pae-base-4.8.13-1.1.x86_64",
"product_id": "kernel-pae-base-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-pae-devel-4.8.13-1.1.x86_64",
"product_id": "kernel-pae-devel-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-source-4.8.13-1.1.x86_64",
"product_id": "kernel-source-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-source-vanilla-4.8.13-1.1.x86_64",
"product_id": "kernel-source-vanilla-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-syms-4.8.13-1.1.x86_64",
"product_id": "kernel-syms-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syzkaller-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-syzkaller-4.8.13-1.1.x86_64",
"product_id": "kernel-syzkaller-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syzkaller-base-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-syzkaller-base-4.8.13-1.1.x86_64",
"product_id": "kernel-syzkaller-base-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"product_id": "kernel-syzkaller-devel-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-vanilla-4.8.13-1.1.x86_64",
"product_id": "kernel-vanilla-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.8.13-1.1.x86_64",
"product_id": "kernel-vanilla-base-4.8.13-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.8.13-1.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.8.13-1.1.x86_64",
"product_id": "kernel-vanilla-devel-4.8.13-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-debug-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-debug-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x"
},
"product_reference": "kernel-debug-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-debug-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-debug-base-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-debug-base-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x"
},
"product_reference": "kernel-debug-base-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-debug-base-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-debug-devel-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-debug-devel-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x"
},
"product_reference": "kernel-debug-devel-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-debug-devel-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-default-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-default-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x"
},
"product_reference": "kernel-default-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-default-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-default-base-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-default-base-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x"
},
"product_reference": "kernel-default-base-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-default-base-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-default-devel-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x"
},
"product_reference": "kernel-default-devel-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-default-devel-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-devel-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-devel-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x"
},
"product_reference": "kernel-devel-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-devel-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-docs-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-docs-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x"
},
"product_reference": "kernel-docs-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-docs-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-docs-html-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-docs-html-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x"
},
"product_reference": "kernel-docs-html-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-docs-html-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-pdf-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-docs-pdf-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-pdf-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-docs-pdf-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-pdf-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x"
},
"product_reference": "kernel-docs-pdf-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-pdf-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-docs-pdf-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-macros-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-macros-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x"
},
"product_reference": "kernel-macros-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-macros-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-obs-build-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x"
},
"product_reference": "kernel-obs-build-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-obs-build-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-obs-qa-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-obs-qa-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x"
},
"product_reference": "kernel-obs-qa-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-obs-qa-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-pae-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-pae-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x"
},
"product_reference": "kernel-pae-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-pae-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-pae-base-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-pae-base-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x"
},
"product_reference": "kernel-pae-base-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-pae-base-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-pae-devel-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-pae-devel-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x"
},
"product_reference": "kernel-pae-devel-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-pae-devel-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-source-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-source-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x"
},
"product_reference": "kernel-source-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-source-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-source-vanilla-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-source-vanilla-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x"
},
"product_reference": "kernel-source-vanilla-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-source-vanilla-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-syms-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-syms-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x"
},
"product_reference": "kernel-syms-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-syms-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syzkaller-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-syzkaller-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syzkaller-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-syzkaller-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syzkaller-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x"
},
"product_reference": "kernel-syzkaller-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syzkaller-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-syzkaller-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syzkaller-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-syzkaller-base-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syzkaller-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x"
},
"product_reference": "kernel-syzkaller-base-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syzkaller-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-syzkaller-base-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syzkaller-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x"
},
"product_reference": "kernel-syzkaller-devel-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-vanilla-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-vanilla-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x"
},
"product_reference": "kernel-vanilla-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-vanilla-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.8.13-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x"
},
"product_reference": "kernel-vanilla-devel-4.8.13-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.8.13-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-3939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3939"
}
],
"notes": [
{
"category": "general",
"text": "The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3939",
"url": "https://www.suse.com/security/cve/CVE-2009-3939"
},
{
"category": "external",
"summary": "SUSE Bug 555173 for CVE-2009-3939",
"url": "https://bugzilla.suse.com/555173"
},
{
"category": "external",
"summary": "SUSE Bug 557180 for CVE-2009-3939",
"url": "https://bugzilla.suse.com/557180"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2009-3939"
},
{
"cve": "CVE-2009-4026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-4026"
}
],
"notes": [
{
"category": "general",
"text": "The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous \"code shuffling patch.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-4026",
"url": "https://www.suse.com/security/cve/CVE-2009-4026"
},
{
"category": "external",
"summary": "SUSE Bug 558267 for CVE-2009-4026",
"url": "https://bugzilla.suse.com/558267"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2009-4026"
},
{
"cve": "CVE-2009-4027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-4027"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-4027",
"url": "https://www.suse.com/security/cve/CVE-2009-4027"
},
{
"category": "external",
"summary": "SUSE Bug 558267 for CVE-2009-4027",
"url": "https://bugzilla.suse.com/558267"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2009-4027"
},
{
"cve": "CVE-2009-4131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-4131"
}
],
"notes": [
{
"category": "general",
"text": "The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-4131",
"url": "https://www.suse.com/security/cve/CVE-2009-4131"
},
{
"category": "external",
"summary": "SUSE Bug 561018 for CVE-2009-4131",
"url": "https://bugzilla.suse.com/561018"
},
{
"category": "external",
"summary": "SUSE Bug 564380 for CVE-2009-4131",
"url": "https://bugzilla.suse.com/564380"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2009-4131"
},
{
"cve": "CVE-2009-4138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-4138"
}
],
"notes": [
{
"category": "general",
"text": "drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-4138",
"url": "https://www.suse.com/security/cve/CVE-2009-4138"
},
{
"category": "external",
"summary": "SUSE Bug 564712 for CVE-2009-4138",
"url": "https://bugzilla.suse.com/564712"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-4138"
},
{
"cve": "CVE-2009-4536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-4536"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-4536",
"url": "https://www.suse.com/security/cve/CVE-2009-4536"
},
{
"category": "external",
"summary": "SUSE Bug 567376 for CVE-2009-4536",
"url": "https://bugzilla.suse.com/567376"
},
{
"category": "external",
"summary": "SUSE Bug 583434 for CVE-2009-4536",
"url": "https://bugzilla.suse.com/583434"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2009-4536"
},
{
"cve": "CVE-2009-4538",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-4538"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-4538",
"url": "https://www.suse.com/security/cve/CVE-2009-4538"
},
{
"category": "external",
"summary": "SUSE Bug 567376 for CVE-2009-4538",
"url": "https://bugzilla.suse.com/567376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2009-4538"
},
{
"cve": "CVE-2010-1146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-1146"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-1146",
"url": "https://www.suse.com/security/cve/CVE-2010-1146"
},
{
"category": "external",
"summary": "SUSE Bug 593906 for CVE-2010-1146",
"url": "https://bugzilla.suse.com/593906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-1146"
},
{
"cve": "CVE-2010-1436",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-1436"
}
],
"notes": [
{
"category": "general",
"text": "gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-1436",
"url": "https://www.suse.com/security/cve/CVE-2010-1436"
},
{
"category": "external",
"summary": "SUSE Bug 599957 for CVE-2010-1436",
"url": "https://bugzilla.suse.com/599957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-1436"
},
{
"cve": "CVE-2010-1641",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-1641"
}
],
"notes": [
{
"category": "general",
"text": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-1641",
"url": "https://www.suse.com/security/cve/CVE-2010-1641"
},
{
"category": "external",
"summary": "SUSE Bug 608576 for CVE-2010-1641",
"url": "https://bugzilla.suse.com/608576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-1641"
},
{
"cve": "CVE-2010-2066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-2066"
}
],
"notes": [
{
"category": "general",
"text": "The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-2066",
"url": "https://www.suse.com/security/cve/CVE-2010-2066"
},
{
"category": "external",
"summary": "SUSE Bug 612457 for CVE-2010-2066",
"url": "https://bugzilla.suse.com/612457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-2066"
},
{
"cve": "CVE-2010-2942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-2942"
}
],
"notes": [
{
"category": "general",
"text": "The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-2942",
"url": "https://www.suse.com/security/cve/CVE-2010-2942"
},
{
"category": "external",
"summary": "SUSE Bug 632309 for CVE-2010-2942",
"url": "https://bugzilla.suse.com/632309"
},
{
"category": "external",
"summary": "SUSE Bug 642324 for CVE-2010-2942",
"url": "https://bugzilla.suse.com/642324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-2942"
},
{
"cve": "CVE-2010-2954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-2954"
}
],
"notes": [
{
"category": "general",
"text": "The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-2954",
"url": "https://www.suse.com/security/cve/CVE-2010-2954"
},
{
"category": "external",
"summary": "SUSE Bug 636112 for CVE-2010-2954",
"url": "https://bugzilla.suse.com/636112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-2954"
},
{
"cve": "CVE-2010-2955",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-2955"
}
],
"notes": [
{
"category": "general",
"text": "The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-2955",
"url": "https://www.suse.com/security/cve/CVE-2010-2955"
},
{
"category": "external",
"summary": "SUSE Bug 635413 for CVE-2010-2955",
"url": "https://bugzilla.suse.com/635413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-2955"
},
{
"cve": "CVE-2010-3081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3081"
}
],
"notes": [
{
"category": "general",
"text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3081",
"url": "https://www.suse.com/security/cve/CVE-2010-3081"
},
{
"category": "external",
"summary": "SUSE Bug 639709 for CVE-2010-3081",
"url": "https://bugzilla.suse.com/639709"
},
{
"category": "external",
"summary": "SUSE Bug 641575 for CVE-2010-3081",
"url": "https://bugzilla.suse.com/641575"
},
{
"category": "external",
"summary": "SUSE Bug 871595 for CVE-2010-3081",
"url": "https://bugzilla.suse.com/871595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2010-3081"
},
{
"cve": "CVE-2010-3296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3296"
}
],
"notes": [
{
"category": "general",
"text": "The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3296",
"url": "https://www.suse.com/security/cve/CVE-2010-3296"
},
{
"category": "external",
"summary": "SUSE Bug 639481 for CVE-2010-3296",
"url": "https://bugzilla.suse.com/639481"
},
{
"category": "external",
"summary": "SUSE Bug 649187 for CVE-2010-3296",
"url": "https://bugzilla.suse.com/649187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2010-3296"
},
{
"cve": "CVE-2010-3297",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3297"
}
],
"notes": [
{
"category": "general",
"text": "The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3297",
"url": "https://www.suse.com/security/cve/CVE-2010-3297"
},
{
"category": "external",
"summary": "SUSE Bug 639482 for CVE-2010-3297",
"url": "https://bugzilla.suse.com/639482"
},
{
"category": "external",
"summary": "SUSE Bug 649187 for CVE-2010-3297",
"url": "https://bugzilla.suse.com/649187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2010-3297"
},
{
"cve": "CVE-2010-3298",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3298"
}
],
"notes": [
{
"category": "general",
"text": "The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3298",
"url": "https://www.suse.com/security/cve/CVE-2010-3298"
},
{
"category": "external",
"summary": "SUSE Bug 639483 for CVE-2010-3298",
"url": "https://bugzilla.suse.com/639483"
},
{
"category": "external",
"summary": "SUSE Bug 649187 for CVE-2010-3298",
"url": "https://bugzilla.suse.com/649187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2010-3298"
},
{
"cve": "CVE-2010-3301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3301"
}
],
"notes": [
{
"category": "general",
"text": "The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3301",
"url": "https://www.suse.com/security/cve/CVE-2010-3301"
},
{
"category": "external",
"summary": "SUSE Bug 639708 for CVE-2010-3301",
"url": "https://bugzilla.suse.com/639708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2010-3301"
},
{
"cve": "CVE-2010-3310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3310"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3310",
"url": "https://www.suse.com/security/cve/CVE-2010-3310"
},
{
"category": "external",
"summary": "SUSE Bug 640721 for CVE-2010-3310",
"url": "https://bugzilla.suse.com/640721"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2010-3310"
},
{
"cve": "CVE-2011-0711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-0711"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-0711",
"url": "https://www.suse.com/security/cve/CVE-2011-0711"
},
{
"category": "external",
"summary": "SUSE Bug 672505 for CVE-2011-0711",
"url": "https://bugzilla.suse.com/672505"
},
{
"category": "external",
"summary": "SUSE Bug 672524 for CVE-2011-0711",
"url": "https://bugzilla.suse.com/672524"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-0711"
},
{
"cve": "CVE-2011-0712",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-0712"
}
],
"notes": [
{
"category": "general",
"text": "Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-0712",
"url": "https://www.suse.com/security/cve/CVE-2011-0712"
},
{
"category": "external",
"summary": "SUSE Bug 672499 for CVE-2011-0712",
"url": "https://bugzilla.suse.com/672499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-0712"
},
{
"cve": "CVE-2011-1020",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-1020"
}
],
"notes": [
{
"category": "general",
"text": "The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-1020",
"url": "https://www.suse.com/security/cve/CVE-2011-1020"
},
{
"category": "external",
"summary": "SUSE Bug 674982 for CVE-2011-1020",
"url": "https://bugzilla.suse.com/674982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-1020"
},
{
"cve": "CVE-2011-1180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-1180"
}
],
"notes": [
{
"category": "general",
"text": "Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-1180",
"url": "https://www.suse.com/security/cve/CVE-2011-1180"
},
{
"category": "external",
"summary": "SUSE Bug 681497 for CVE-2011-1180",
"url": "https://bugzilla.suse.com/681497"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2011-1180"
},
{
"cve": "CVE-2011-1577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-1577"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-1577",
"url": "https://www.suse.com/security/cve/CVE-2011-1577"
},
{
"category": "external",
"summary": "SUSE Bug 687113 for CVE-2011-1577",
"url": "https://bugzilla.suse.com/687113"
},
{
"category": "external",
"summary": "SUSE Bug 692784 for CVE-2011-1577",
"url": "https://bugzilla.suse.com/692784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-1577"
},
{
"cve": "CVE-2011-1581",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-1581"
}
],
"notes": [
{
"category": "general",
"text": "The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-1581",
"url": "https://www.suse.com/security/cve/CVE-2011-1581"
},
{
"category": "external",
"summary": "SUSE Bug 687116 for CVE-2011-1581",
"url": "https://bugzilla.suse.com/687116"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-1581"
},
{
"cve": "CVE-2011-2203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-2203"
}
],
"notes": [
{
"category": "general",
"text": "The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-2203",
"url": "https://www.suse.com/security/cve/CVE-2011-2203"
},
{
"category": "external",
"summary": "SUSE Bug 699709 for CVE-2011-2203",
"url": "https://bugzilla.suse.com/699709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-2203"
},
{
"cve": "CVE-2011-4604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4604"
}
],
"notes": [
{
"category": "general",
"text": "The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4604",
"url": "https://www.suse.com/security/cve/CVE-2011-4604"
},
{
"category": "external",
"summary": "SUSE Bug 736149 for CVE-2011-4604",
"url": "https://bugzilla.suse.com/736149"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-4604"
},
{
"cve": "CVE-2012-0056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0056"
}
],
"notes": [
{
"category": "general",
"text": "The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/\u003cpid\u003e/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0056",
"url": "https://www.suse.com/security/cve/CVE-2012-0056"
},
{
"category": "external",
"summary": "SUSE Bug 1171985 for CVE-2012-0056",
"url": "https://bugzilla.suse.com/1171985"
},
{
"category": "external",
"summary": "SUSE Bug 742028 for CVE-2012-0056",
"url": "https://bugzilla.suse.com/742028"
},
{
"category": "external",
"summary": "SUSE Bug 742279 for CVE-2012-0056",
"url": "https://bugzilla.suse.com/742279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0056"
},
{
"cve": "CVE-2012-3412",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3412"
}
],
"notes": [
{
"category": "general",
"text": "The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3412",
"url": "https://www.suse.com/security/cve/CVE-2012-3412"
},
{
"category": "external",
"summary": "SUSE Bug 774523 for CVE-2012-3412",
"url": "https://bugzilla.suse.com/774523"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2012-3412"
},
{
"cve": "CVE-2012-3520",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3520"
}
],
"notes": [
{
"category": "general",
"text": "The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3520",
"url": "https://www.suse.com/security/cve/CVE-2012-3520"
},
{
"category": "external",
"summary": "SUSE Bug 776925 for CVE-2012-3520",
"url": "https://bugzilla.suse.com/776925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2012-3520"
},
{
"cve": "CVE-2013-0160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-0160"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-0160",
"url": "https://www.suse.com/security/cve/CVE-2013-0160"
},
{
"category": "external",
"summary": "SUSE Bug 797175 for CVE-2013-0160",
"url": "https://bugzilla.suse.com/797175"
},
{
"category": "external",
"summary": "SUSE Bug 841063 for CVE-2013-0160",
"url": "https://bugzilla.suse.com/841063"
},
{
"category": "external",
"summary": "SUSE Bug 871595 for CVE-2013-0160",
"url": "https://bugzilla.suse.com/871595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2013-0160"
},
{
"cve": "CVE-2013-0231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-0231"
}
],
"notes": [
{
"category": "general",
"text": "The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-0231",
"url": "https://www.suse.com/security/cve/CVE-2013-0231"
},
{
"category": "external",
"summary": "SUSE Bug 801178 for CVE-2013-0231",
"url": "https://bugzilla.suse.com/801178"
},
{
"category": "external",
"summary": "SUSE Bug 841063 for CVE-2013-0231",
"url": "https://bugzilla.suse.com/841063"
},
{
"category": "external",
"summary": "SUSE Bug 871595 for CVE-2013-0231",
"url": "https://bugzilla.suse.com/871595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-0231"
},
{
"cve": "CVE-2013-0913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-0913"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-0913",
"url": "https://www.suse.com/security/cve/CVE-2013-0913"
},
{
"category": "external",
"summary": "SUSE Bug 808829 for CVE-2013-0913",
"url": "https://bugzilla.suse.com/808829"
},
{
"category": "external",
"summary": "SUSE Bug 871595 for CVE-2013-0913",
"url": "https://bugzilla.suse.com/871595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2013-0913"
},
{
"cve": "CVE-2013-2850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-2850"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-2850",
"url": "https://www.suse.com/security/cve/CVE-2013-2850"
},
{
"category": "external",
"summary": "SUSE Bug 821560 for CVE-2013-2850",
"url": "https://bugzilla.suse.com/821560"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2013-2850"
},
{
"cve": "CVE-2014-0038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0038"
}
],
"notes": [
{
"category": "general",
"text": "The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0038",
"url": "https://www.suse.com/security/cve/CVE-2014-0038"
},
{
"category": "external",
"summary": "SUSE Bug 860993 for CVE-2014-0038",
"url": "https://bugzilla.suse.com/860993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-0038"
},
{
"cve": "CVE-2014-0196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0196"
}
],
"notes": [
{
"category": "general",
"text": "The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the \"LECHO \u0026 !OPOST\" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0196",
"url": "https://www.suse.com/security/cve/CVE-2014-0196"
},
{
"category": "external",
"summary": "SUSE Bug 871252 for CVE-2014-0196",
"url": "https://bugzilla.suse.com/871252"
},
{
"category": "external",
"summary": "SUSE Bug 875690 for CVE-2014-0196",
"url": "https://bugzilla.suse.com/875690"
},
{
"category": "external",
"summary": "SUSE Bug 877345 for CVE-2014-0196",
"url": "https://bugzilla.suse.com/877345"
},
{
"category": "external",
"summary": "SUSE Bug 879878 for CVE-2014-0196",
"url": "https://bugzilla.suse.com/879878"
},
{
"category": "external",
"summary": "SUSE Bug 933423 for CVE-2014-0196",
"url": "https://bugzilla.suse.com/933423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-0196"
},
{
"cve": "CVE-2014-0691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0691"
}
],
"notes": [
{
"category": "general",
"text": "Cisco WebEx Meetings Server before 1.1 uses meeting IDs with insufficient entropy, which makes it easier for remote attackers to bypass authentication and join arbitrary meetings without a password, aka Bug ID CSCuc79643.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0691",
"url": "https://www.suse.com/security/cve/CVE-2014-0691"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-0691"
},
{
"cve": "CVE-2014-8133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8133"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8133",
"url": "https://www.suse.com/security/cve/CVE-2014-8133"
},
{
"category": "external",
"summary": "SUSE Bug 817142 for CVE-2014-8133",
"url": "https://bugzilla.suse.com/817142"
},
{
"category": "external",
"summary": "SUSE Bug 906545 for CVE-2014-8133",
"url": "https://bugzilla.suse.com/906545"
},
{
"category": "external",
"summary": "SUSE Bug 907818 for CVE-2014-8133",
"url": "https://bugzilla.suse.com/907818"
},
{
"category": "external",
"summary": "SUSE Bug 909077 for CVE-2014-8133",
"url": "https://bugzilla.suse.com/909077"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2014-8133"
},
{
"cve": "CVE-2015-1333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1333"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1333",
"url": "https://www.suse.com/security/cve/CVE-2015-1333"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2015-1333",
"url": "https://bugzilla.suse.com/1126909"
},
{
"category": "external",
"summary": "SUSE Bug 1185451 for CVE-2015-1333",
"url": "https://bugzilla.suse.com/1185451"
},
{
"category": "external",
"summary": "SUSE Bug 938645 for CVE-2015-1333",
"url": "https://bugzilla.suse.com/938645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-1333"
},
{
"cve": "CVE-2015-7550",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7550"
}
],
"notes": [
{
"category": "general",
"text": "The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7550",
"url": "https://www.suse.com/security/cve/CVE-2015-7550"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2015-7550",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 1052256 for CVE-2015-7550",
"url": "https://bugzilla.suse.com/1052256"
},
{
"category": "external",
"summary": "SUSE Bug 958951 for CVE-2015-7550",
"url": "https://bugzilla.suse.com/958951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-7550"
},
{
"cve": "CVE-2015-7884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7884"
}
],
"notes": [
{
"category": "general",
"text": "The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7884",
"url": "https://www.suse.com/security/cve/CVE-2015-7884"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2015-7884",
"url": "https://bugzilla.suse.com/1126909"
},
{
"category": "external",
"summary": "SUSE Bug 951626 for CVE-2015-7884",
"url": "https://bugzilla.suse.com/951626"
},
{
"category": "external",
"summary": "SUSE Bug 951627 for CVE-2015-7884",
"url": "https://bugzilla.suse.com/951627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2015-7884"
},
{
"cve": "CVE-2015-7885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7885"
}
],
"notes": [
{
"category": "general",
"text": "The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7885",
"url": "https://www.suse.com/security/cve/CVE-2015-7885"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2015-7885",
"url": "https://bugzilla.suse.com/1126909"
},
{
"category": "external",
"summary": "SUSE Bug 951626 for CVE-2015-7885",
"url": "https://bugzilla.suse.com/951626"
},
{
"category": "external",
"summary": "SUSE Bug 951627 for CVE-2015-7885",
"url": "https://bugzilla.suse.com/951627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2015-7885"
},
{
"cve": "CVE-2015-8539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8539"
}
],
"notes": [
{
"category": "general",
"text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8539",
"url": "https://www.suse.com/security/cve/CVE-2015-8539"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2015-8539",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 781018 for CVE-2015-8539",
"url": "https://bugzilla.suse.com/781018"
},
{
"category": "external",
"summary": "SUSE Bug 958463 for CVE-2015-8539",
"url": "https://bugzilla.suse.com/958463"
},
{
"category": "external",
"summary": "SUSE Bug 958601 for CVE-2015-8539",
"url": "https://bugzilla.suse.com/958601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-8539"
},
{
"cve": "CVE-2015-8660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8660"
}
],
"notes": [
{
"category": "general",
"text": "The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8660",
"url": "https://www.suse.com/security/cve/CVE-2015-8660"
},
{
"category": "external",
"summary": "SUSE Bug 923755 for CVE-2015-8660",
"url": "https://bugzilla.suse.com/923755"
},
{
"category": "external",
"summary": "SUSE Bug 960281 for CVE-2015-8660",
"url": "https://bugzilla.suse.com/960281"
},
{
"category": "external",
"summary": "SUSE Bug 960329 for CVE-2015-8660",
"url": "https://bugzilla.suse.com/960329"
},
{
"category": "external",
"summary": "SUSE Bug 963994 for CVE-2015-8660",
"url": "https://bugzilla.suse.com/963994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-8660"
},
{
"cve": "CVE-2016-0723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0723"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0723",
"url": "https://www.suse.com/security/cve/CVE-2016-0723"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-0723",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 961500 for CVE-2016-0723",
"url": "https://bugzilla.suse.com/961500"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-0723"
},
{
"cve": "CVE-2016-0728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0728"
}
],
"notes": [
{
"category": "general",
"text": "The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0728",
"url": "https://www.suse.com/security/cve/CVE-2016-0728"
},
{
"category": "external",
"summary": "SUSE Bug 923755 for CVE-2016-0728",
"url": "https://bugzilla.suse.com/923755"
},
{
"category": "external",
"summary": "SUSE Bug 962075 for CVE-2016-0728",
"url": "https://bugzilla.suse.com/962075"
},
{
"category": "external",
"summary": "SUSE Bug 962078 for CVE-2016-0728",
"url": "https://bugzilla.suse.com/962078"
},
{
"category": "external",
"summary": "SUSE Bug 963994 for CVE-2016-0728",
"url": "https://bugzilla.suse.com/963994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-0728"
},
{
"cve": "CVE-2016-1237",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1237"
}
],
"notes": [
{
"category": "general",
"text": "nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1237",
"url": "https://www.suse.com/security/cve/CVE-2016-1237"
},
{
"category": "external",
"summary": "SUSE Bug 986570 for CVE-2016-1237",
"url": "https://bugzilla.suse.com/986570"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-1237"
},
{
"cve": "CVE-2016-1583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1583"
}
],
"notes": [
{
"category": "general",
"text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1583",
"url": "https://www.suse.com/security/cve/CVE-2016-1583"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-1583",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 1052256 for CVE-2016-1583",
"url": "https://bugzilla.suse.com/1052256"
},
{
"category": "external",
"summary": "SUSE Bug 983143 for CVE-2016-1583",
"url": "https://bugzilla.suse.com/983143"
},
{
"category": "external",
"summary": "SUSE Bug 983144 for CVE-2016-1583",
"url": "https://bugzilla.suse.com/983144"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-1583"
},
{
"cve": "CVE-2016-2184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2184"
}
],
"notes": [
{
"category": "general",
"text": "The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2184",
"url": "https://www.suse.com/security/cve/CVE-2016-2184"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-2184",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 971125 for CVE-2016-2184",
"url": "https://bugzilla.suse.com/971125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-2184"
},
{
"cve": "CVE-2016-2185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2185"
}
],
"notes": [
{
"category": "general",
"text": "The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2185",
"url": "https://www.suse.com/security/cve/CVE-2016-2185"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-2185",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 971124 for CVE-2016-2185",
"url": "https://bugzilla.suse.com/971124"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-2185"
},
{
"cve": "CVE-2016-2186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2186"
}
],
"notes": [
{
"category": "general",
"text": "The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2186",
"url": "https://www.suse.com/security/cve/CVE-2016-2186"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-2186",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 970958 for CVE-2016-2186",
"url": "https://bugzilla.suse.com/970958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-2186"
},
{
"cve": "CVE-2016-2384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2384"
}
],
"notes": [
{
"category": "general",
"text": "Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2384",
"url": "https://www.suse.com/security/cve/CVE-2016-2384"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-2384",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 966693 for CVE-2016-2384",
"url": "https://bugzilla.suse.com/966693"
},
{
"category": "external",
"summary": "SUSE Bug 967773 for CVE-2016-2384",
"url": "https://bugzilla.suse.com/967773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-2384"
},
{
"cve": "CVE-2016-3134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3134"
}
],
"notes": [
{
"category": "general",
"text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3134",
"url": "https://www.suse.com/security/cve/CVE-2016-3134"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-3134",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 1052256 for CVE-2016-3134",
"url": "https://bugzilla.suse.com/1052256"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-3134",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 971126 for CVE-2016-3134",
"url": "https://bugzilla.suse.com/971126"
},
{
"category": "external",
"summary": "SUSE Bug 971793 for CVE-2016-3134",
"url": "https://bugzilla.suse.com/971793"
},
{
"category": "external",
"summary": "SUSE Bug 986362 for CVE-2016-3134",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "external",
"summary": "SUSE Bug 986365 for CVE-2016-3134",
"url": "https://bugzilla.suse.com/986365"
},
{
"category": "external",
"summary": "SUSE Bug 986377 for CVE-2016-3134",
"url": "https://bugzilla.suse.com/986377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-3134"
},
{
"cve": "CVE-2016-3135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3135"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c in the Linux kernel through 4.5.2 on 32-bit platforms allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3135",
"url": "https://www.suse.com/security/cve/CVE-2016-3135"
},
{
"category": "external",
"summary": "SUSE Bug 970904 for CVE-2016-3135",
"url": "https://bugzilla.suse.com/970904"
},
{
"category": "external",
"summary": "SUSE Bug 971794 for CVE-2016-3135",
"url": "https://bugzilla.suse.com/971794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-3135"
},
{
"cve": "CVE-2016-3136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3136"
}
],
"notes": [
{
"category": "general",
"text": "The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3136",
"url": "https://www.suse.com/security/cve/CVE-2016-3136"
},
{
"category": "external",
"summary": "SUSE Bug 970955 for CVE-2016-3136",
"url": "https://bugzilla.suse.com/970955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-3136"
},
{
"cve": "CVE-2016-3140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3140"
}
],
"notes": [
{
"category": "general",
"text": "The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3140",
"url": "https://www.suse.com/security/cve/CVE-2016-3140"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-3140",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 970892 for CVE-2016-3140",
"url": "https://bugzilla.suse.com/970892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-3140"
},
{
"cve": "CVE-2016-3689",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3689"
}
],
"notes": [
{
"category": "general",
"text": "The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3689",
"url": "https://www.suse.com/security/cve/CVE-2016-3689"
},
{
"category": "external",
"summary": "SUSE Bug 971628 for CVE-2016-3689",
"url": "https://bugzilla.suse.com/971628"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-3689"
},
{
"cve": "CVE-2016-3713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3713"
}
],
"notes": [
{
"category": "general",
"text": "The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3713",
"url": "https://www.suse.com/security/cve/CVE-2016-3713"
},
{
"category": "external",
"summary": "SUSE Bug 979715 for CVE-2016-3713",
"url": "https://bugzilla.suse.com/979715"
},
{
"category": "external",
"summary": "SUSE Bug 985132 for CVE-2016-3713",
"url": "https://bugzilla.suse.com/985132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-3713"
},
{
"cve": "CVE-2016-4470",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4470"
}
],
"notes": [
{
"category": "general",
"text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4470",
"url": "https://www.suse.com/security/cve/CVE-2016-4470"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4470",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 984755 for CVE-2016-4470",
"url": "https://bugzilla.suse.com/984755"
},
{
"category": "external",
"summary": "SUSE Bug 984764 for CVE-2016-4470",
"url": "https://bugzilla.suse.com/984764"
},
{
"category": "external",
"summary": "SUSE Bug 991651 for CVE-2016-4470",
"url": "https://bugzilla.suse.com/991651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-4470"
},
{
"cve": "CVE-2016-4485",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4485"
}
],
"notes": [
{
"category": "general",
"text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4485",
"url": "https://www.suse.com/security/cve/CVE-2016-4485"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4485",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 978821 for CVE-2016-4485",
"url": "https://bugzilla.suse.com/978821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-4485"
},
{
"cve": "CVE-2016-4486",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4486"
}
],
"notes": [
{
"category": "general",
"text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4486",
"url": "https://www.suse.com/security/cve/CVE-2016-4486"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4486",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 978822 for CVE-2016-4486",
"url": "https://bugzilla.suse.com/978822"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-4486"
},
{
"cve": "CVE-2016-4557",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4557"
}
],
"notes": [
{
"category": "general",
"text": "The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4557",
"url": "https://www.suse.com/security/cve/CVE-2016-4557"
},
{
"category": "external",
"summary": "SUSE Bug 979018 for CVE-2016-4557",
"url": "https://bugzilla.suse.com/979018"
},
{
"category": "external",
"summary": "SUSE Bug 979077 for CVE-2016-4557",
"url": "https://bugzilla.suse.com/979077"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-4557"
},
{
"cve": "CVE-2016-4558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4558"
}
],
"notes": [
{
"category": "general",
"text": "The BPF subsystem in the Linux kernel before 4.5.5 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted application on (1) a system with more than 32 Gb of memory, related to the program reference count or (2) a 1 Tb system, related to the map reference count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4558",
"url": "https://www.suse.com/security/cve/CVE-2016-4558"
},
{
"category": "external",
"summary": "SUSE Bug 979019 for CVE-2016-4558",
"url": "https://bugzilla.suse.com/979019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-4558"
},
{
"cve": "CVE-2016-4569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4569"
}
],
"notes": [
{
"category": "general",
"text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4569",
"url": "https://www.suse.com/security/cve/CVE-2016-4569"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4569",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 979213 for CVE-2016-4569",
"url": "https://bugzilla.suse.com/979213"
},
{
"category": "external",
"summary": "SUSE Bug 979879 for CVE-2016-4569",
"url": "https://bugzilla.suse.com/979879"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-4569"
},
{
"cve": "CVE-2016-4578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4578"
}
],
"notes": [
{
"category": "general",
"text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4578",
"url": "https://www.suse.com/security/cve/CVE-2016-4578"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4578",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 1052256 for CVE-2016-4578",
"url": "https://bugzilla.suse.com/1052256"
},
{
"category": "external",
"summary": "SUSE Bug 979879 for CVE-2016-4578",
"url": "https://bugzilla.suse.com/979879"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-4578"
},
{
"cve": "CVE-2016-4951",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4951"
}
],
"notes": [
{
"category": "general",
"text": "The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4951",
"url": "https://www.suse.com/security/cve/CVE-2016-4951"
},
{
"category": "external",
"summary": "SUSE Bug 981058 for CVE-2016-4951",
"url": "https://bugzilla.suse.com/981058"
},
{
"category": "external",
"summary": "SUSE Bug 985132 for CVE-2016-4951",
"url": "https://bugzilla.suse.com/985132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-4951"
},
{
"cve": "CVE-2016-4997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4997"
}
],
"notes": [
{
"category": "general",
"text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4997",
"url": "https://www.suse.com/security/cve/CVE-2016-4997"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 986362 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "external",
"summary": "SUSE Bug 986365 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986365"
},
{
"category": "external",
"summary": "SUSE Bug 986377 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "external",
"summary": "SUSE Bug 991651 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/991651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-4997"
},
{
"cve": "CVE-2016-4998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4998"
}
],
"notes": [
{
"category": "general",
"text": "The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4998",
"url": "https://www.suse.com/security/cve/CVE-2016-4998"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4998",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 986362 for CVE-2016-4998",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "external",
"summary": "SUSE Bug 986365 for CVE-2016-4998",
"url": "https://bugzilla.suse.com/986365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-4998"
},
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
},
{
"cve": "CVE-2016-5244",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5244"
}
],
"notes": [
{
"category": "general",
"text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5244",
"url": "https://www.suse.com/security/cve/CVE-2016-5244"
},
{
"category": "external",
"summary": "SUSE Bug 983213 for CVE-2016-5244",
"url": "https://bugzilla.suse.com/983213"
},
{
"category": "external",
"summary": "SUSE Bug 986225 for CVE-2016-5244",
"url": "https://bugzilla.suse.com/986225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-5244"
},
{
"cve": "CVE-2016-5829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5829"
}
],
"notes": [
{
"category": "general",
"text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5829",
"url": "https://www.suse.com/security/cve/CVE-2016-5829"
},
{
"category": "external",
"summary": "SUSE Bug 1053919 for CVE-2016-5829",
"url": "https://bugzilla.suse.com/1053919"
},
{
"category": "external",
"summary": "SUSE Bug 1054127 for CVE-2016-5829",
"url": "https://bugzilla.suse.com/1054127"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-5829",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 986572 for CVE-2016-5829",
"url": "https://bugzilla.suse.com/986572"
},
{
"category": "external",
"summary": "SUSE Bug 986573 for CVE-2016-5829",
"url": "https://bugzilla.suse.com/986573"
},
{
"category": "external",
"summary": "SUSE Bug 991651 for CVE-2016-5829",
"url": "https://bugzilla.suse.com/991651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-5829"
},
{
"cve": "CVE-2016-6187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6187"
}
],
"notes": [
{
"category": "general",
"text": "The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6187",
"url": "https://www.suse.com/security/cve/CVE-2016-6187"
},
{
"category": "external",
"summary": "SUSE Bug 988307 for CVE-2016-6187",
"url": "https://bugzilla.suse.com/988307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-6187"
},
{
"cve": "CVE-2016-6480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6480"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6480",
"url": "https://www.suse.com/security/cve/CVE-2016-6480"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-6480",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 991608 for CVE-2016-6480",
"url": "https://bugzilla.suse.com/991608"
},
{
"category": "external",
"summary": "SUSE Bug 991667 for CVE-2016-6480",
"url": "https://bugzilla.suse.com/991667"
},
{
"category": "external",
"summary": "SUSE Bug 992568 for CVE-2016-6480",
"url": "https://bugzilla.suse.com/992568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-6480"
},
{
"cve": "CVE-2016-6516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6516"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the ioctl_file_dedupe_range function in fs/ioctl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (heap-based buffer overflow) or possibly gain privileges by changing a certain count value, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6516",
"url": "https://www.suse.com/security/cve/CVE-2016-6516"
},
{
"category": "external",
"summary": "SUSE Bug 991604 for CVE-2016-6516",
"url": "https://bugzilla.suse.com/991604"
},
{
"category": "external",
"summary": "SUSE Bug 991669 for CVE-2016-6516",
"url": "https://bugzilla.suse.com/991669"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-6516"
},
{
"cve": "CVE-2016-6828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6828"
}
],
"notes": [
{
"category": "general",
"text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6828",
"url": "https://www.suse.com/security/cve/CVE-2016-6828"
},
{
"category": "external",
"summary": "SUSE Bug 1052256 for CVE-2016-6828",
"url": "https://bugzilla.suse.com/1052256"
},
{
"category": "external",
"summary": "SUSE Bug 994296 for CVE-2016-6828",
"url": "https://bugzilla.suse.com/994296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-6828"
},
{
"cve": "CVE-2016-7039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7039"
}
],
"notes": [
{
"category": "general",
"text": "The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7039",
"url": "https://www.suse.com/security/cve/CVE-2016-7039"
},
{
"category": "external",
"summary": "SUSE Bug 1001486 for CVE-2016-7039",
"url": "https://bugzilla.suse.com/1001486"
},
{
"category": "external",
"summary": "SUSE Bug 1001487 for CVE-2016-7039",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "external",
"summary": "SUSE Bug 1003964 for CVE-2016-7039",
"url": "https://bugzilla.suse.com/1003964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-7039"
},
{
"cve": "CVE-2016-7042",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7042"
}
],
"notes": [
{
"category": "general",
"text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7042",
"url": "https://www.suse.com/security/cve/CVE-2016-7042"
},
{
"category": "external",
"summary": "SUSE Bug 1004517 for CVE-2016-7042",
"url": "https://bugzilla.suse.com/1004517"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7042"
},
{
"cve": "CVE-2016-7425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7425"
}
],
"notes": [
{
"category": "general",
"text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7425",
"url": "https://www.suse.com/security/cve/CVE-2016-7425"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-7425",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 999932 for CVE-2016-7425",
"url": "https://bugzilla.suse.com/999932"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7425"
},
{
"cve": "CVE-2016-7913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7913"
}
],
"notes": [
{
"category": "general",
"text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7913",
"url": "https://www.suse.com/security/cve/CVE-2016-7913"
},
{
"category": "external",
"summary": "SUSE Bug 1010478 for CVE-2016-7913",
"url": "https://bugzilla.suse.com/1010478"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-7913"
},
{
"cve": "CVE-2016-9555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9555"
}
],
"notes": [
{
"category": "general",
"text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9555",
"url": "https://www.suse.com/security/cve/CVE-2016-9555"
},
{
"category": "external",
"summary": "SUSE Bug 1011685 for CVE-2016-9555",
"url": "https://bugzilla.suse.com/1011685"
},
{
"category": "external",
"summary": "SUSE Bug 1012183 for CVE-2016-9555",
"url": "https://bugzilla.suse.com/1012183"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-9555",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-9555"
},
{
"cve": "CVE-2016-9576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9576"
}
],
"notes": [
{
"category": "general",
"text": "The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9576",
"url": "https://www.suse.com/security/cve/CVE-2016-9576"
},
{
"category": "external",
"summary": "SUSE Bug 1013604 for CVE-2016-9576",
"url": "https://bugzilla.suse.com/1013604"
},
{
"category": "external",
"summary": "SUSE Bug 1014271 for CVE-2016-9576",
"url": "https://bugzilla.suse.com/1014271"
},
{
"category": "external",
"summary": "SUSE Bug 1017710 for CVE-2016-9576",
"url": "https://bugzilla.suse.com/1017710"
},
{
"category": "external",
"summary": "SUSE Bug 1019079 for CVE-2016-9576",
"url": "https://bugzilla.suse.com/1019079"
},
{
"category": "external",
"summary": "SUSE Bug 1019668 for CVE-2016-9576",
"url": "https://bugzilla.suse.com/1019668"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-9576",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x",
"openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-9576"
}
]
}
RHSA-2011:0833
Vulnerability from csaf_redhat - Published: 2011-05-31 14:03 - Updated: 2026-01-13 22:08The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BNEPCONNADD command.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, and then reading a modprobe command line.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Workaround
|
The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Xen, possibly before 4.0.2, allows local 64-bit PV guests to cause a denial of service (host crash) by specifying user mode execution without user-mode pagetables.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Integer overflow in the _ctl_do_mpt_command function in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier might allow local users to gain privileges or cause a denial of service (memory corruption) via an ioctl call specifying a crafted value that triggers a heap-based buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — | ||
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A flaw in the dccp_rcv_state_process() function could allow a remote\nattacker to cause a denial of service, even when the socket was already\nclosed. (CVE-2011-1093, Important)\n\n* Multiple buffer overflow flaws were found in the Linux kernel\u0027s\nManagement Module Support for Message Passing Technology (MPT) based\ncontrollers. A local, unprivileged user could use these flaws to cause a\ndenial of service, an information leak, or escalate their privileges.\n(CVE-2011-1494, CVE-2011-1495, Important)\n\n* A missing validation of a null-terminated string data structure element\nin the bnep_sock_ioctl() function could allow a local user to cause an\ninformation leak or a denial of service. (CVE-2011-1079, Moderate)\n\n* Missing error checking in the way page tables were handled in the Xen\nhypervisor implementation could allow a privileged guest user to cause the\nhost, and the guests, to lock up. (CVE-2011-1166, Moderate)\n\n* A flaw was found in the way the Xen hypervisor implementation checked for\nthe upper boundary when getting a new event channel port. A privileged\nguest user could use this flaw to cause a denial of service or escalate\ntheir privileges. (CVE-2011-1763, Moderate)\n\n* The start_code and end_code values in \"/proc/[pid]/stat\" were not\nprotected. In certain scenarios, this flaw could be used to defeat Address\nSpace Layout Randomization (ASLR). (CVE-2011-0726, Low)\n\n* A missing initialization flaw in the sco_sock_getsockopt() function could\nallow a local, unprivileged user to cause an information leak.\n(CVE-2011-1078, Low)\n\n* A missing validation of a null-terminated string data structure element\nin the do_replace() function could allow a local user who has the\nCAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1080, Low)\n\n* A buffer overflow flaw in the DEC Alpha OSF partition implementation in\nthe Linux kernel could allow a local attacker to cause an information leak\nby mounting a disk that contains specially-crafted partition tables.\n(CVE-2011-1163, Low)\n\n* Missing validations of null-terminated string data structure elements in\nthe do_replace(), compat_do_replace(), do_ipt_get_ctl(), do_ip6t_get_ctl(),\nand do_arpt_get_ctl() functions could allow a local user who has the\nCAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1170,\nCVE-2011-1171, CVE-2011-1172, Low)\n\n* A heap overflow flaw in the Linux kernel\u0027s EFI GUID Partition Table (GPT)\nimplementation could allow a local attacker to cause a denial of service\nby mounting a disk that contains specially-crafted partition tables.\n(CVE-2011-1577, Low)\n\nRed Hat would like to thank Dan Rosenberg for reporting CVE-2011-1494 and\nCVE-2011-1495; Vasiliy Kulikov for reporting CVE-2011-1079, CVE-2011-1078,\nCVE-2011-1080, CVE-2011-1170, CVE-2011-1171, and CVE-2011-1172; Kees Cook\nfor reporting CVE-2011-0726; and Timo Warns for reporting CVE-2011-1163\nand CVE-2011-1577.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues, and fix the bugs noted in the Technical\nNotes. The system must be rebooted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0833",
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html#RHSA-2011-0833",
"url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html#RHSA-2011-0833"
},
{
"category": "external",
"summary": "681259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681259"
},
{
"category": "external",
"summary": "681260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681260"
},
{
"category": "external",
"summary": "681262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681262"
},
{
"category": "external",
"summary": "682954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682954"
},
{
"category": "external",
"summary": "684569",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684569"
},
{
"category": "external",
"summary": "688021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688021"
},
{
"category": "external",
"summary": "688156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688156"
},
{
"category": "external",
"summary": "688579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688579"
},
{
"category": "external",
"summary": "689321",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689321"
},
{
"category": "external",
"summary": "689327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689327"
},
{
"category": "external",
"summary": "689345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689345"
},
{
"category": "external",
"summary": "689699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689699"
},
{
"category": "external",
"summary": "689700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689700"
},
{
"category": "external",
"summary": "690134",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=690134"
},
{
"category": "external",
"summary": "690239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=690239"
},
{
"category": "external",
"summary": "694021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694021"
},
{
"category": "external",
"summary": "695976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"category": "external",
"summary": "696136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=696136"
},
{
"category": "external",
"summary": "697448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=697448"
},
{
"category": "external",
"summary": "699808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699808"
},
{
"category": "external",
"summary": "701240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=701240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0833.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2026-01-13T22:08:13+00:00",
"generator": {
"date": "2026-01-13T22:08:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2011:0833",
"initial_release_date": "2011-05-31T14:03:00+00:00",
"revision_history": [
{
"date": "2011-05-31T14:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-05-31T10:05:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:08:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.12.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.12.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-238.12.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.12.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.12.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-238.12.1.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.12.1.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-238.12.1.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.12.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.12.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-238.12.1.el5.src",
"product_id": "kernel-0:2.6.18-238.12.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.12.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-238.12.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.12.1.el5.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-238.12.1.el5.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-238.12.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-238.12.1.el5.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Kees Cook"
]
}
],
"cve": "CVE-2011-0726",
"discovery_date": "2011-03-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "684569"
}
],
"notes": [
{
"category": "description",
"text": "The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: proc: protect mm start_code/end_code in /proc/pid/stat",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle,\nhttps://access.redhat.com/support/policy/updates/errata/, therefore the fix for\nthis issue is not currently planned to be included in the future updates. Future kernel updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0726"
},
{
"category": "external",
"summary": "RHBZ#684569",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684569"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0726",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0726"
}
],
"release_date": "2011-03-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: proc: protect mm start_code/end_code in /proc/pid/stat"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1078",
"discovery_date": "2011-02-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "681259"
}
],
"notes": [
{
"category": "description",
"text": "The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bt sco_conninfo infoleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1078"
},
{
"category": "external",
"summary": "RHBZ#681259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681259"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1078",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1078"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1078",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1078"
}
],
"release_date": "2011-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: bt sco_conninfo infoleak"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1079",
"discovery_date": "2011-02-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "681260"
}
],
"notes": [
{
"category": "description",
"text": "The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a \u0027\\0\u0027 character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BNEPCONNADD command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bnep device field missing NULL terminator",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1079"
},
{
"category": "external",
"summary": "RHBZ#681260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1079"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1079",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1079"
}
],
"release_date": "2011-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bnep device field missing NULL terminator"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1080",
"discovery_date": "2011-02-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "681262"
}
],
"notes": [
{
"category": "description",
"text": "The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a \u0027\\0\u0027 character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, and then reading a modprobe command line.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ebtables stack infoleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1080"
},
{
"category": "external",
"summary": "RHBZ#681262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681262"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1080",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1080"
}
],
"release_date": "2011-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ebtables stack infoleak"
},
{
"cve": "CVE-2011-1093",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2011-03-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682954"
}
],
"notes": [
{
"category": "description",
"text": "The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dccp: fix oops on Reset after close",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not include support for the DCCP protocol. Future updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1093"
},
{
"category": "external",
"summary": "RHBZ#682954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1093"
}
],
"release_date": "2011-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
},
{
"category": "workaround",
"details": "For users that do not run applications that use DCCP, you can prevent the dccp\nmodule from being loaded by adding the following entry to the end of the\n/etc/modprobe.d/blacklist file:\n\nblacklist dccp\n\nThis way, the dccp module cannot be loaded accidentally, which may occur if an\napplication that requires DCCP is started. A reboot is not necessary for this\nchange to take effect but do make sure the module is not loaded in the first\nplace. You can verify that by running:\n\nlsmod | grep dccp\n\nYou may also consider removing the CAP_SYS_MODULE capability from the current\nglobal capability set to prevent kernel modules from being loaded or unloaded.\nThe CAP_SYS_MODULE has a capability number of 16 (see linux/capability.h). The\ndefault value has all the bits set. To remove this capability, you have to\nclear the 16th bit of the default 32-bit value, e.g. 0xffffff ^ (1 \u003c\u003c 16):\n\necho 0xFFFEFFFF \u003e /proc/sys/kernel/cap-bound",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: dccp: fix oops on Reset after close"
},
{
"acknowledgments": [
{
"names": [
"Timo Warns"
]
}
],
"cve": "CVE-2011-1163",
"discovery_date": "2011-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "688021"
}
],
"notes": [
{
"category": "description",
"text": "The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fs/partitions: Corrupted OSF partition table infoleak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0833.html, https://rhn.redhat.com/errata/RHSA-2011-0542.html, and https://rhn.redhat.com/errata/RHSA-2011-0500.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for\nthis issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1163"
},
{
"category": "external",
"summary": "RHBZ#688021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1163",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1163"
}
],
"release_date": "2011-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: fs/partitions: Corrupted OSF partition table infoleak"
},
{
"cve": "CVE-2011-1166",
"discovery_date": "2011-03-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "688579"
}
],
"notes": [
{
"category": "description",
"text": "Xen, possibly before 4.0.2, allows local 64-bit PV guests to cause a denial of service (host crash) by specifying user mode execution without user-mode pagetables.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xen: x86_64: fix error checking in arch_set_info_guest()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1166"
},
{
"category": "external",
"summary": "RHBZ#688579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688579"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1166",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1166"
}
],
"release_date": "2011-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xen: x86_64: fix error checking in arch_set_info_guest()"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1170",
"discovery_date": "2011-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "689321"
}
],
"notes": [
{
"category": "description",
"text": "net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected \u0027\\0\u0027 character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv4: netfilter: arp_tables: fix infoleak to userspace",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance\nlife-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore\nthe fix for this issue is not currently planned to be included in the future\nupdates. Future kernel updates in Red Hat Enterprise Linux 5, 6 and Red Hat\nEnterprise MRG may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1170"
},
{
"category": "external",
"summary": "RHBZ#689321",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689321"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1170"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1170",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1170"
}
],
"release_date": "2011-03-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ipv4: netfilter: arp_tables: fix infoleak to userspace"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1171",
"discovery_date": "2011-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "689327"
}
],
"notes": [
{
"category": "description",
"text": "net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected \u0027\\0\u0027 character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv4: netfilter: ip_tables: fix infoleak to userspace",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance\nlife-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates. Future kernel updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1171"
},
{
"category": "external",
"summary": "RHBZ#689327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1171",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1171"
}
],
"release_date": "2011-03-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ipv4: netfilter: ip_tables: fix infoleak to userspace"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1172",
"discovery_date": "2011-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "689345"
}
],
"notes": [
{
"category": "description",
"text": "net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected \u0027\\0\u0027 character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: netfilter: ip6_tables: fix infoleak to userspace",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle,\nhttps://access.redhat.com/support/policy/updates/errata/, therefore the fix for\nthis issue is not currently planned to be included in the future updates. Future kernel updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise\nMRG may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1172"
},
{
"category": "external",
"summary": "RHBZ#689345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1172"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1172",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1172"
}
],
"release_date": "2011-03-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ipv6: netfilter: ip6_tables: fix infoleak to userspace"
},
{
"acknowledgments": [
{
"names": [
"Dan Rosenberg"
]
}
],
"cve": "CVE-2011-1494",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2011-04-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "694021"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the _ctl_do_mpt_command function in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier might allow local users to gain privileges or cause a denial of service (memory corruption) via an ioctl call specifying a crafted value that triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drivers/scsi/mpt2sas: prevent heap overflows",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as it did not provide support for MPT (Message Passing\nTechnology) based controllers. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0833.html, and https://rhn.redhat.com/errata/RHSA-2011-0542.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1494"
},
{
"category": "external",
"summary": "RHBZ#694021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1494"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1494",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1494"
}
],
"release_date": "2011-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: drivers/scsi/mpt2sas: prevent heap overflows"
},
{
"acknowledgments": [
{
"names": [
"Dan Rosenberg"
]
}
],
"cve": "CVE-2011-1495",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2011-04-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "694021"
}
],
"notes": [
{
"category": "description",
"text": "drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drivers/scsi/mpt2sas: prevent heap overflows",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as it did not provide support for MPT (Message Passing\nTechnology) based controllers. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0833.html, and https://rhn.redhat.com/errata/RHSA-2011-0542.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1495"
},
{
"category": "external",
"summary": "RHBZ#694021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1495",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1495"
}
],
"release_date": "2011-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: drivers/scsi/mpt2sas: prevent heap overflows"
},
{
"acknowledgments": [
{
"names": [
"Timo Warns"
]
}
],
"cve": "CVE-2011-1577",
"discovery_date": "2011-04-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "695976"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: corrupted GUID partition tables can cause kernel oops",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0833.html, https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1577"
},
{
"category": "external",
"summary": "RHBZ#695976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1577",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1577"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1577",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1577"
}
],
"release_date": "2011-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: corrupted GUID partition tables can cause kernel oops"
},
{
"cve": "CVE-2011-1763",
"discovery_date": "2011-04-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "701240"
}
],
"notes": [
{
"category": "description",
"text": "The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xen: improper upper boundary check in get_free_port() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects Red Hat Enterprise Linux 5 as we did not backport upstream Xen unstable commit 2dcdd2fcb945. The versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"known_not_affected": [
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1763"
},
{
"category": "external",
"summary": "RHBZ#701240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=701240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1763",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1763"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1763",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1763"
}
],
"release_date": "2011-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xen: improper upper boundary check in get_free_port() function"
}
]
}
RHSA-2011:1253
Vulnerability from csaf_redhat - Published: 2011-09-12 19:40 - Updated: 2026-02-18 16:54fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an "OOM dodging issue," a related issue to CVE-2010-3858.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Race condition in the sctp_icmp_proto_unreachable function in net/sctp/input.c in Linux kernel 2.6.11-rc2 through 2.6.33 allows remote attackers to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, which causes the socket to be freed and triggers list corruption, related to the sctp_wait_for_connect function.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
drivers/acpi/debugfs.c in the Linux kernel before 3.0 allows local users to modify arbitrary kernel memory locations by leveraging root privileges to write to the /sys/kernel/debug/acpi/custom_method file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4347.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c in the Linux kernel before 2.6.38 stores NFSv4 ACL data in memory that is allocated by kmalloc but not properly freed, which allows local users to cause a denial of service (panic) via a crafted attempt to set an ACL.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The napi_reuse_skb function in net/core/dev.c in the Generic Receive Offload (GRO) implementation in the Linux kernel before 2.6.38 does not reset the values of certain structure members, which might allow remote attackers to cause a denial of service (NULL pointer dereference) via a malformed VLAN frame.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Double free vulnerability in the inotify subsystem in the Linux kernel before 2.6.39 allows local users to cause a denial of service (system crash) via vectors involving failed attempts to create files. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-4250.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the _ctl_do_mpt_command function in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier might allow local users to gain privileges or cause a denial of service (memory corruption) via an ioctl call specifying a crafted value that triggers a heap-based buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The Generic Receive Offload (GRO) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux 5 and 2.6.32 on Red Hat Enterprise Linux 6, as used in Red Hat Enterprise Virtualization (RHEV) Hypervisor and other products, allows remote attackers to cause a denial of service via crafted VLAN packets that are processed by the napi_reuse_skb function, leading to (1) a memory leak or (2) memory corruption, a different vulnerability than CVE-2011-1478.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The cifs_find_smb_ses function in fs/cifs/connect.c in the Linux kernel before 2.6.36 does not properly determine the associations between users and sessions, which allows local users to bypass CIFS share authentication by leveraging a mount of a share by a different user.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel before 2.6.38.4 allow local users to cause a denial of service (system crash) via a crafted (1) getdents or (2) readdir system call.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The bcm_release function in net/can/bcm.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory functions in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allow local users to trigger buffer overflows, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via vectors related to calls that specify a large number of memory pages.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The raw_release function in net/can/raw.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
net/ipv4/ip_gre.c in the Linux kernel before 2.6.34, when ip_gre is configured as a module, allows remote attackers to cause a denial of service (OOPS) by sending a packet during module loading.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The tunnels implementation in the Linux kernel before 2.6.34, when tunnel functionality is configured as a module, allows remote attackers to cause a denial of service (OOPS) by sending a packet during module loading.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Race condition in the scan_get_next_rmap_item function in mm/ksm.c in the Linux kernel before 2.6.39.3, when Kernel SamePage Merging (KSM) is enabled, allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The add_del_listener function in kernel/taskstats.c in the Linux kernel 2.6.39.1 and earlier does not prevent multiple registrations of exit handlers, which allows local users to cause a denial of service (memory and CPU consumption), and bypass the OOM Killer, via a crafted application.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockopt_old function in net/bluetooth/l2cap_sock.c and (2) the rfcomm_sock_getsockopt_old function in net/bluetooth/rfcomm/sock.c.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user's password.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the vma_to_resize function in mm/mremap.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (BUG_ON and system crash) via a crafted mremap system call that expands a memory mapping.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Multiple buffer overflows in net/wireless/nl80211.c in the Linux kernel before 2.6.39.2 allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability during scan operations with a long SSID value.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
Multiple off-by-one errors in the ext4 subsystem in the Linux kernel before 3.0-rc5 allow local users to cause a denial of service (BUG_ON and system crash) by accessing a sparse file in extent format with a write operation involving a block number corresponding to the largest possible 32-bit unsigned integer.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel-rt packages that fix multiple security issues and various\nbugs are now available for Red Hat Enterprise MRG 2.0.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Security fixes:\n\n* A flaw in the SCTP and DCCP implementations could allow a remote attacker\nto cause a denial of service. (CVE-2010-4526, CVE-2011-1770, Important)\n\n* Flaws in the Management Module Support for Message Passing Technology\n(MPT) based controllers could allow a local, unprivileged user to cause a\ndenial of service, an information leak, or escalate their privileges.\n(CVE-2011-1494, CVE-2011-1495, Important)\n\n* Flaws in the AGPGART driver, and a flaw in agp_allocate_memory(), could\nallow a local user to cause a denial of service or escalate their\nprivileges. (CVE-2011-1745, CVE-2011-2022, CVE-2011-1746, Important)\n\n* A flaw in the client-side NLM implementation could allow a local,\nunprivileged user to cause a denial of service. (CVE-2011-2491, Important)\n\n* A flaw in the Bluetooth implementation could allow a remote attacker to\ncause a denial of service or escalate their privileges. (CVE-2011-2497,\nImportant)\n\n* Flaws in the netlink-based wireless configuration interface could allow a\nlocal user, who has the CAP_NET_ADMIN capability, to cause a denial of\nservice or escalate their privileges on systems that have an active\nwireless interface. (CVE-2011-2517, Important)\n\n* The maximum file offset handling for ext4 file systems could allow a\nlocal, unprivileged user to cause a denial of service. (CVE-2011-2695,\nImportant)\n\n* A local, unprivileged user could allocate large amounts of memory not\nvisible to the OOM killer, causing a denial of service. (CVE-2010-4243,\nModerate)\n\n* The proc file system could allow a local, unprivileged user to obtain\nsensitive information or possibly cause integrity issues. (CVE-2011-1020,\nModerate)\n\n* A local, privileged user could possibly write arbitrary kernel memory via\n/sys/kernel/debug/acpi/custom_method. (CVE-2011-1021, Moderate)\n\n* Inconsistency in the methods for allocating and freeing NFSv4 ACL data;\nCVE-2010-4250 fix caused a regression; a flaw in next_pidmap() and\ninet_diag_bc_audit(); flaws in the CAN implementation; a race condition in\nthe memory merging support; a flaw in the taskstats subsystem; and the way\nmapping expansions were handled could allow a local, unprivileged user to\ncause a denial of service. (CVE-2011-1090, CVE-2011-1479, CVE-2011-1593,\nCVE-2011-2213, CVE-2011-1598, CVE-2011-1748, CVE-2011-2183, CVE-2011-2484,\nCVE-2011-2496, Moderate)\n\n* A flaw in GRO could result in a denial of service when a malformed VLAN\nframe is received. (CVE-2011-1478, Moderate)\n\n* napi_reuse_skb() could be called on VLAN packets allowing an attacker on\nthe local network to possibly trigger a denial of service. (CVE-2011-1576,\nModerate)\n\n* A denial of service could occur if packets were received while the ipip\nor ip_gre module was being loaded. (CVE-2011-1767, CVE-2011-1768, Moderate)\n\n* Information leaks. (CVE-2011-1160, CVE-2011-2492, CVE-2011-2495, Low)\n\n* Flaws in the EFI GUID Partition Table implementation could allow a local\nattacker to cause a denial of service. (CVE-2011-1577, CVE-2011-1776, Low)\n\n* While a user has a CIFS share mounted that required successful\nauthentication, a local, unprivileged user could mount that share without\nknowing the correct password if mount.cifs was setuid root. (CVE-2011-1585,\nLow)\n\nRed Hat would like to thank Dan Rosenberg for reporting CVE-2011-1770,\nCVE-2011-1494, CVE-2011-1495, CVE-2011-2497, and CVE-2011-2213; Vasiliy\nKulikov of Openwall for reporting CVE-2011-1745, CVE-2011-2022,\nCVE-2011-1746, CVE-2011-2484, and CVE-2011-2495; Vasily Averin for\nreporting CVE-2011-2491; Brad Spengler for reporting CVE-2010-4243; Kees\nCook for reporting CVE-2011-1020; Robert Swiecki for reporting\nCVE-2011-1593 and CVE-2011-2496; Oliver Hartkopp for reporting\nCVE-2011-1748; Andrea Righi for reporting CVE-2011-2183; Ryan Sweat for\nreporting CVE-2011-1478 and CVE-2011-1576; Peter Huewe for reporting\nCVE-2011-1160; Marek Kroemeke and Filip Palian for reporting CVE-2011-2492;\nand Timo Warns for reporting CVE-2011-1577 and CVE-2011-1776.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1253",
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2.0/html/Technical_Notes/index.html",
"url": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2.0/html/Technical_Notes/index.html"
},
{
"category": "external",
"summary": "625688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625688"
},
{
"category": "external",
"summary": "664914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664914"
},
{
"category": "external",
"summary": "680358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680358"
},
{
"category": "external",
"summary": "680841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680841"
},
{
"category": "external",
"summary": "681987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681987"
},
{
"category": "external",
"summary": "682641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682641"
},
{
"category": "external",
"summary": "684671",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684671"
},
{
"category": "external",
"summary": "691270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=691270"
},
{
"category": "external",
"summary": "691793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=691793"
},
{
"category": "external",
"summary": "694021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694021"
},
{
"category": "external",
"summary": "695173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695173"
},
{
"category": "external",
"summary": "695976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"category": "external",
"summary": "697394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=697394"
},
{
"category": "external",
"summary": "697822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=697822"
},
{
"category": "external",
"summary": "698057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698057"
},
{
"category": "external",
"summary": "698996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698996"
},
{
"category": "external",
"summary": "698998",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698998"
},
{
"category": "external",
"summary": "702303",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=702303"
},
{
"category": "external",
"summary": "703011",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703011"
},
{
"category": "external",
"summary": "703019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703019"
},
{
"category": "external",
"summary": "703026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703026"
},
{
"category": "external",
"summary": "709393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709393"
},
{
"category": "external",
"summary": "710158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=710158"
},
{
"category": "external",
"summary": "710338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=710338"
},
{
"category": "external",
"summary": "714536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714536"
},
{
"category": "external",
"summary": "715436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715436"
},
{
"category": "external",
"summary": "716538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=716538"
},
{
"category": "external",
"summary": "716805",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=716805"
},
{
"category": "external",
"summary": "716825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=716825"
},
{
"category": "external",
"summary": "718152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=718152"
},
{
"category": "external",
"summary": "722557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722557"
},
{
"category": "external",
"summary": "728310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=728310"
},
{
"category": "external",
"summary": "728551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=728551"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1253.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2026-02-18T16:54:45+00:00",
"generator": {
"date": "2026-02-18T16:54:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2011:1253",
"initial_release_date": "2011-09-12T19:40:00+00:00",
"revision_history": [
{
"date": "2011-09-12T19:40:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-09-12T15:43:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-18T16:54:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.33.9-rt31.75.el6rt?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"product_id": "kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@2.6.33.9-rt31.75.el6rt?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"product_id": "kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.33.9-rt31.75.el6rt?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"product": {
"name": "kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"product_id": "kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@2.6.33.9-rt31.75.el6rt?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.33.9-rt31.75.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src"
},
"product_reference": "kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Brad Spengler"
]
}
],
"cve": "CVE-2010-4243",
"discovery_date": "2010-08-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "625688"
}
],
"notes": [
{
"category": "description",
"text": "fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an \"OOM dodging issue,\" a related issue to CVE-2010-3858.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-4243"
},
{
"category": "external",
"summary": "RHBZ#625688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625688"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-4243",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4243"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4243",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4243"
}
],
"release_date": "2010-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads"
},
{
"cve": "CVE-2010-4526",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2010-12-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "664914"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the sctp_icmp_proto_unreachable function in net/sctp/input.c in Linux kernel 2.6.11-rc2 through 2.6.33 allows remote attackers to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, which causes the socket to be freed and triggers list corruption, related to the sctp_wait_for_connect function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: a race between ICMP protocol unreachable and connect()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Linux kernel as shipped with Red Hat Enterprise Linux 4 did not include\nupstream commit history:5aabd1fe268e850c2e93048a5ccc5eb6970ac49c, and therefore\nis not affected by this issue. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via http://rhn.redhat.com/errata/RHSA-2011-0163.html, https://rhn.redhat.com/errata/RHSA-2011-0421.html and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-4526"
},
{
"category": "external",
"summary": "RHBZ#664914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=664914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-4526",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4526"
}
],
"release_date": "2010-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: sctp: a race between ICMP protocol unreachable and connect()"
},
{
"acknowledgments": [
{
"names": [
"Kees Cook"
]
}
],
"cve": "CVE-2011-1020",
"discovery_date": "2011-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "680358"
}
],
"notes": [
{
"category": "description",
"text": "The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: no access restrictions of /proc/pid/* after setuid program exec",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.\n\nThis has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via RHSA-2012:0007, RHSA-2011:1530 and RHSA-2011:1253 respectively.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1020"
},
{
"category": "external",
"summary": "RHBZ#680358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680358"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1020"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1020",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1020"
}
],
"release_date": "2011-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: no access restrictions of /proc/pid/* after setuid program exec"
},
{
"cve": "CVE-2011-1021",
"discovery_date": "2011-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "680841"
}
],
"notes": [
{
"category": "description",
"text": "drivers/acpi/debugfs.c in the Linux kernel before 3.0 allows local users to modify arbitrary kernel memory locations by leveraging root privileges to write to the /sys/kernel/debug/acpi/custom_method file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4347.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: /sys/kernel/debug/acpi/custom_method can bypass module restrictions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The version of Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and 6 as they did not include upstream commit a1a541d8 and a25ee920 that introduced the problem. This has been addressed in Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1253.html.\n\nNotes:\n\nThis requires debugfs to be mounted on a local system in order to have access\nto the custom_method file. Debugfs is not mounted by default. You need to run\n\"mount -t debugfs nodev /sys/kernel/debug\" as root first.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1021"
},
{
"category": "external",
"summary": "RHBZ#680841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1021",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1021"
}
],
"release_date": "2011-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: /sys/kernel/debug/acpi/custom_method can bypass module restrictions"
},
{
"cve": "CVE-2011-1090",
"discovery_date": "2011-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682641"
}
],
"notes": [
{
"category": "description",
"text": "The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c in the Linux kernel before 2.6.38 stores NFSv4 ACL data in memory that is allocated by kmalloc but not properly freed, which allows local users to cause a denial of service (panic) via a crafted attempt to set an ACL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not backport the upstream commit 4b580ee3 that introduced this issue. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0429.html, https://rhn.redhat.com/errata/RHSA-2011-0542.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1090"
},
{
"category": "external",
"summary": "RHBZ#682641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682641"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1090",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1090"
}
],
"release_date": "2011-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab"
},
{
"acknowledgments": [
{
"names": [
"Peter Huewe"
]
}
],
"cve": "CVE-2011-1160",
"discovery_date": "2011-03-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "684671"
}
],
"notes": [
{
"category": "description",
"text": "The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tpm infoleaks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1160"
},
{
"category": "external",
"summary": "RHBZ#684671",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684671"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1160",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1160"
}
],
"release_date": "2011-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.2,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: tpm infoleaks"
},
{
"acknowledgments": [
{
"names": [
"Ryan Sweat"
]
}
],
"cve": "CVE-2011-1478",
"discovery_date": "2011-02-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "691270"
}
],
"notes": [
{
"category": "description",
"text": "The napi_reuse_skb function in net/core/dev.c in the Generic Receive Offload (GRO) implementation in the Linux kernel before 2.6.38 does not reset the values of certain structure members, which might allow remote attackers to cause a denial of service (NULL pointer dereference) via a malformed VLAN frame.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: gro: reset dev and skb_iff on skb reuse",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not support Generic Receive Offload (GRO). It has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0429.html, https://rhn.redhat.com/errata/RHSA-2011-0421.html and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1478"
},
{
"category": "external",
"summary": "RHBZ#691270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=691270"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1478",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1478"
}
],
"release_date": "2011-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: gro: reset dev and skb_iff on skb reuse"
},
{
"cve": "CVE-2011-1479",
"discovery_date": "2011-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "691793"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in the inotify subsystem in the Linux kernel before 2.6.39 allows local users to cause a denial of service (system crash) via vectors involving failed attempts to create files. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-4250.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS (crash) due slab corruption in inotify_init1 (incomplete fix for CVE-2010-4250)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 and 5. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0498.html and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1479"
},
{
"category": "external",
"summary": "RHBZ#691793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=691793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1479",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1479"
}
],
"release_date": "2011-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS (crash) due slab corruption in inotify_init1 (incomplete fix for CVE-2010-4250)"
},
{
"acknowledgments": [
{
"names": [
"Dan Rosenberg"
]
}
],
"cve": "CVE-2011-1494",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2011-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "694021"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the _ctl_do_mpt_command function in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier might allow local users to gain privileges or cause a denial of service (memory corruption) via an ioctl call specifying a crafted value that triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drivers/scsi/mpt2sas: prevent heap overflows",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as it did not provide support for MPT (Message Passing\nTechnology) based controllers. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0833.html, and https://rhn.redhat.com/errata/RHSA-2011-0542.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1494"
},
{
"category": "external",
"summary": "RHBZ#694021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1494"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1494",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1494"
}
],
"release_date": "2011-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: drivers/scsi/mpt2sas: prevent heap overflows"
},
{
"acknowledgments": [
{
"names": [
"Dan Rosenberg"
]
}
],
"cve": "CVE-2011-1495",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2011-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "694021"
}
],
"notes": [
{
"category": "description",
"text": "drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drivers/scsi/mpt2sas: prevent heap overflows",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as it did not provide support for MPT (Message Passing\nTechnology) based controllers. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0833.html, and https://rhn.redhat.com/errata/RHSA-2011-0542.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1495"
},
{
"category": "external",
"summary": "RHBZ#694021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1495",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1495"
}
],
"release_date": "2011-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: drivers/scsi/mpt2sas: prevent heap overflows"
},
{
"acknowledgments": [
{
"names": [
"Ryan Sweat"
]
}
],
"cve": "CVE-2011-1576",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2011-02-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "695173"
}
],
"notes": [
{
"category": "description",
"text": "The Generic Receive Offload (GRO) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux 5 and 2.6.32 on Red Hat Enterprise Linux 6, as used in Red Hat Enterprise Virtualization (RHEV) Hypervisor and other products, allows remote attackers to cause a denial of service via crafted VLAN packets that are processed by the napi_reuse_skb function, leading to (1) a memory leak or (2) memory corruption, a different vulnerability than CVE-2011-1478.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: Fix memory leak/corruption on VLAN GRO_DROP",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as it did not support Generic Receive Offload (GRO). This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html and https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1576"
},
{
"category": "external",
"summary": "RHBZ#695173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695173"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1576",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1576"
}
],
"release_date": "2011-06-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: Fix memory leak/corruption on VLAN GRO_DROP"
},
{
"acknowledgments": [
{
"names": [
"Timo Warns"
]
}
],
"cve": "CVE-2011-1577",
"discovery_date": "2011-04-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "695976"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: corrupted GUID partition tables can cause kernel oops",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0833.html, https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1577"
},
{
"category": "external",
"summary": "RHBZ#695976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1577",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1577"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1577",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1577"
}
],
"release_date": "2011-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: corrupted GUID partition tables can cause kernel oops"
},
{
"cve": "CVE-2011-1585",
"discovery_date": "2011-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "697394"
}
],
"notes": [
{
"category": "description",
"text": "The cifs_find_smb_ses function in fs/cifs/connect.c in the Linux kernel before 2.6.36 does not properly determine the associations between users and sessions, which allows local users to bypass CIFS share authentication by leveraging a mount of a share by a different user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cifs session reuse",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped in Red Hat Enterprise Linux 4, 5, 6, and Red Hat Enterprise MRG as they did not ship mount.cifs with root setuid set. However, as a preventive meaasure, we have addressed this in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1386.html and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1585"
},
{
"category": "external",
"summary": "RHBZ#697394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=697394"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1585",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1585"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1585",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1585"
}
],
"release_date": "2010-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: cifs session reuse"
},
{
"acknowledgments": [
{
"names": [
"Robert Swiecki"
]
}
],
"cve": "CVE-2011-1593",
"discovery_date": "2011-04-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "697822"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel before 2.6.38.4 allow local users to cause a denial of service (system crash) via a crafted (1) getdents or (2) readdir system call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: proc: signedness issue in next_pidmap()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1593"
},
{
"category": "external",
"summary": "RHBZ#697822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=697822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1593",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1593"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1593",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1593"
}
],
"release_date": "2011-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: proc: signedness issue in next_pidmap()"
},
{
"acknowledgments": [
{
"names": [
"Oliver Hartkopp"
]
}
],
"cve": "CVE-2011-1598",
"discovery_date": "2011-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "698057"
}
],
"notes": [
{
"category": "description",
"text": "The bcm_release function in net/can/bcm.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: missing check in can/bcm and can/raw socket releases",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1598"
},
{
"category": "external",
"summary": "RHBZ#698057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698057"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1598",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1598"
}
],
"release_date": "2011-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: missing check in can/bcm and can/raw socket releases"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1745",
"discovery_date": "2011-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "698996"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of Linux kernel as shipped with Red Hat\nEnterprise 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-1350.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1745"
},
{
"category": "external",
"summary": "RHBZ#698996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698996"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1745",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1745"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1745",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1745"
}
],
"release_date": "2011-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1746",
"discovery_date": "2011-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "698998"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory functions in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allow local users to trigger buffer overflows, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via vectors related to calls that specify a large number of memory pages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: agp: insufficient page_count parameter checking in agp_allocate_memory()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of Linux kernel as shipped with Red Hat Enterprise 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-1350.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1746"
},
{
"category": "external",
"summary": "RHBZ#698998",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698998"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1746",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1746"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1746",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1746"
}
],
"release_date": "2011-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: agp: insufficient page_count parameter checking in agp_allocate_memory()"
},
{
"acknowledgments": [
{
"names": [
"Oliver Hartkopp"
]
}
],
"cve": "CVE-2011-1748",
"discovery_date": "2011-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "698057"
}
],
"notes": [
{
"category": "description",
"text": "The raw_release function in net/can/raw.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: missing check in can/bcm and can/raw socket releases",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1748"
},
{
"category": "external",
"summary": "RHBZ#698057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698057"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1748",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1748"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1748",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1748"
}
],
"release_date": "2011-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: missing check in can/bcm and can/raw socket releases"
},
{
"cve": "CVE-2011-1767",
"discovery_date": "2011-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "702303"
}
],
"notes": [
{
"category": "description",
"text": "net/ipv4/ip_gre.c in the Linux kernel before 2.6.34, when ip_gre is configured as a module, allows remote attackers to cause a denial of service (OOPS) by sending a packet during module loading.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netns vs proto registration ordering",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Linux kernel as shipped with Red Hat Enterprise Linux 4, and 5 did not provide support for Network Namespace, and therefore are not affected by this issue. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0928.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1767"
},
{
"category": "external",
"summary": "RHBZ#702303",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=702303"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1767",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1767"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1767",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1767"
}
],
"release_date": "2010-02-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.4,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netns vs proto registration ordering"
},
{
"cve": "CVE-2011-1768",
"discovery_date": "2011-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "702303"
}
],
"notes": [
{
"category": "description",
"text": "The tunnels implementation in the Linux kernel before 2.6.34, when tunnel functionality is configured as a module, allows remote attackers to cause a denial of service (OOPS) by sending a packet during module loading.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netns vs proto registration ordering",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Linux kernel as shipped with Red Hat Enterprise Linux 4, and 5 did not provide support for Network Namespace, and therefore are not affected by this issue. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0928.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1768"
},
{
"category": "external",
"summary": "RHBZ#702303",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=702303"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1768",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1768"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1768",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1768"
}
],
"release_date": "2010-02-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.4,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netns vs proto registration ordering"
},
{
"acknowledgments": [
{
"names": [
"Dan Rosenberg"
]
}
],
"cve": "CVE-2011-1770",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2011-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "703011"
}
],
"notes": [
{
"category": "description",
"text": "Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dccp: handle invalid feature options length",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect Red Hat Enterprise Linux 4 and 5: Red Hat Enterprise Linux 4 does not provide support for the Datagram Congestion Control Protocol (DCCP), and Red Hat Enterprise Linux 5, which does support DCCP, did not backport the upstream commit that introduced this issue, e77b8363b. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0836.html and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1770"
},
{
"category": "external",
"summary": "RHBZ#703011",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703011"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1770",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1770"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1770",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1770"
}
],
"release_date": "2011-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: dccp: handle invalid feature options length"
},
{
"acknowledgments": [
{
"names": [
"Timo Warns"
]
}
],
"cve": "CVE-2011-1776",
"discovery_date": "2011-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "703026"
}
],
"notes": [
{
"category": "description",
"text": "The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: validate size of EFI GUID partition entries",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of Linux kernel as shipped with Red Hat\nEnterprise 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html and https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1776"
},
{
"category": "external",
"summary": "RHBZ#703026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703026"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1776",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1776"
}
],
"release_date": "2011-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: validate size of EFI GUID partition entries"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-2022",
"discovery_date": "2011-04-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "698996"
}
],
"notes": [
{
"category": "description",
"text": "The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of Linux kernel as shipped with Red Hat\nEnterprise 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-1350.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2022"
},
{
"category": "external",
"summary": "RHBZ#698996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698996"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2022"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2022",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2022"
}
],
"release_date": "2011-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls"
},
{
"acknowledgments": [
{
"names": [
"Andrea Righi"
]
}
],
"cve": "CVE-2011-2183",
"discovery_date": "2011-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "710338"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the scan_get_next_rmap_item function in mm/ksm.c in the Linux kernel before 2.6.39.3, when Kernel SamePage Merging (KSM) is enabled, allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ksm: race between ksmd and exiting task",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG do not provide support for KSM (Kernel Samepage Merging). This has been addressed in Red Hat Enterprise Linux 6 via https://rhn.redhat.com/errata/RHSA-2011-1189.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2183"
},
{
"category": "external",
"summary": "RHBZ#710338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=710338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2183"
}
],
"release_date": "2011-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ksm: race between ksmd and exiting task"
},
{
"acknowledgments": [
{
"names": [
"Dan Rosenberg"
]
}
],
"cve": "CVE-2011-2213",
"discovery_date": "2011-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "714536"
}
],
"notes": [
{
"category": "description",
"text": "The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: inet_diag: insufficient validation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel as shipped with Red Hat Enterprise Linux 4,\n5, 6, and Red Hat Enterprise MRG. Red Hat Enterprise Linux 4 is now in\nProduction 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2213"
},
{
"category": "external",
"summary": "RHBZ#714536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=714536"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2213"
}
],
"release_date": "2011-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: inet_diag: insufficient validation"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-2484",
"discovery_date": "2011-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "715436"
}
],
"notes": [
{
"category": "description",
"text": "The add_del_listener function in kernel/taskstats.c in the Linux kernel 2.6.39.1 and earlier does not prevent multiple registrations of exit handlers, which allows local users to cause a denial of service (memory and CPU consumption), and bypass the OOM Killer, via a crafted application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: taskstats: duplicate entries in listener mode can lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as it did not provide support for the Taskstats interface. This was fixed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1386.html, https://rhn.redhat.com/errata/RHSA-2011-1350.html and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2484"
},
{
"category": "external",
"summary": "RHBZ#715436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715436"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2484"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2484",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2484"
}
],
"release_date": "2011-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: taskstats: duplicate entries in listener mode can lead to DoS"
},
{
"acknowledgments": [
{
"names": [
"Vasily Averin"
]
}
],
"cve": "CVE-2011-2491",
"discovery_date": "2011-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "709393"
}
],
"notes": [
{
"category": "description",
"text": "The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: rpc task leak after flock()ing NFS share",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2491"
},
{
"category": "external",
"summary": "RHBZ#709393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2491",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2491"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2491",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2491"
}
],
"release_date": "2011-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: rpc task leak after flock()ing NFS share"
},
{
"acknowledgments": [
{
"names": [
"Marek Kroemeke",
"Filip Palian"
]
}
],
"cve": "CVE-2011-2492",
"discovery_date": "2011-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "703019"
}
],
"notes": [
{
"category": "description",
"text": "The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockopt_old function in net/bluetooth/l2cap_sock.c and (2) the rfcomm_sock_getsockopt_old function in net/bluetooth/rfcomm/sock.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. It has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2492"
},
{
"category": "external",
"summary": "RHBZ#703019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2492",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2492"
}
],
"release_date": "2011-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-2495",
"discovery_date": "2011-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "716825"
}
],
"notes": [
{
"category": "description",
"text": "fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user\u0027s password.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: /proc/PID/io infoleak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1212.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2495"
},
{
"category": "external",
"summary": "RHBZ#716825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=716825"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2495"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: /proc/PID/io infoleak"
},
{
"acknowledgments": [
{
"names": [
"Robert Swiecki"
]
}
],
"cve": "CVE-2011-2496",
"discovery_date": "2011-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "716538"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the vma_to_resize function in mm/mremap.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (BUG_ON and system crash) via a crafted mremap system call that expands a memory mapping.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2496"
},
{
"category": "external",
"summary": "RHBZ#716538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=716538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2496",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2496"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2496",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2496"
}
],
"release_date": "2011-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions"
},
{
"acknowledgments": [
{
"names": [
"Dan Rosenberg"
]
}
],
"cve": "CVE-2011-2497",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"discovery_date": "2011-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "716805"
}
],
"notes": [
{
"category": "description",
"text": "Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bluetooth: buffer overflow in l2cap config request",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 as they did not backport the upstream commit 5dee9e7c that introduced this issue. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2497"
},
{
"category": "external",
"summary": "RHBZ#716805",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=716805"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2497",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2497"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2497",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2497"
}
],
"release_date": "2011-06-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: bluetooth: buffer overflow in l2cap config request"
},
{
"cve": "CVE-2011-2517",
"discovery_date": "2011-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "718152"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in net/wireless/nl80211.c in the Linux kernel before 2.6.39.2 allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability during scan operations with a long SSID value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nl80211: missing check for valid SSID size in scan operations",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as it did not provide support for the Linux wireless LAN (802.11) configuration API. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1212.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2517"
},
{
"category": "external",
"summary": "RHBZ#718152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=718152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2517",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2517"
}
],
"release_date": "2011-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nl80211: missing check for valid SSID size in scan operations"
},
{
"cve": "CVE-2011-2695",
"discovery_date": "2011-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "722557"
}
],
"notes": [
{
"category": "description",
"text": "Multiple off-by-one errors in the ext4 subsystem in the Linux kernel before 3.0-rc5 allow local users to cause a denial of service (BUG_ON and system crash) by accessing a sparse file in extent format with a write operation involving a block number corresponding to the largest possible 32-bit unsigned integer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ext4: kernel panic when writing data to the last block of sparse file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1386.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not include support for EXT4 filesystem.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2695"
},
{
"category": "external",
"summary": "RHBZ#722557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722557"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2695"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2695",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2695"
}
],
"release_date": "2011-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-09-12T19:40:00+00:00",
"details": "This update also fixes various bugs. Documentation for these bug fixes\nwill be available shortly from the Technical Notes document linked to\nin the References section.\n\nUsers should upgrade to these updated packages, which correct these\nissues, and fix the bugs noted in the Technical Notes. The system\nmust be rebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1253"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-0:2.6.33.9-rt31.75.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:2.6.33.9-rt31.75.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:2.6.33.9-rt31.75.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ext4: kernel panic when writing data to the last block of sparse file"
}
]
}
RHSA-2011:1465
Vulnerability from csaf_redhat - Published: 2011-11-22 16:36 - Updated: 2025-11-21 17:39The tpm_read function in the Linux kernel 2.6 does not properly clear memory, which might allow local users to read the results of the previous TPM command.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
kernel/taskstats.c in the Linux kernel before 3.1 allows local users to obtain sensitive I/O statistics by sending taskstats commands to a netlink socket, as demonstrated by discovering the length of another user's password.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
Untrusted search path vulnerability in the perf_config function in tools/perf/util/config.c in perf, as distributed in the Linux kernel before 3.1, allows local users to overwrite arbitrary files via a crafted config file in the current working directory.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel before 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read request for a directory.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
A certain Red Hat patch to the vlan_hwaccel_do_receive function in net/8021q/vlan_core.c in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows remote attackers to cause a denial of service (system crash) via priority-tagged VLAN frames.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix multiple security issues and various bugs\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* IPv6 fragment identification value generation could allow a remote\nattacker to disrupt a target system\u0027s networking, preventing legitimate\nusers from accessing its services. (CVE-2011-2699, Important)\n\n* A signedness issue was found in the Linux kernel\u0027s CIFS (Common Internet\nFile System) implementation. A malicious CIFS server could send a\nspecially-crafted response to a directory read request that would result in\na denial of service or privilege escalation on a system that has a CIFS\nshare mounted. (CVE-2011-3191, Important)\n\n* A flaw was found in the way the Linux kernel handled fragmented IPv6 UDP\ndatagrams over the bridge with UDP Fragmentation Offload (UFO)\nfunctionality on. A remote attacker could use this flaw to cause a denial\nof service. (CVE-2011-4326, Important)\n\n* The way IPv4 and IPv6 protocol sequence numbers and fragment IDs were\ngenerated could allow a man-in-the-middle attacker to inject packets and\npossibly hijack connections. Protocol sequence numbers and fragment IDs are\nnow more random. (CVE-2011-3188, Moderate)\n\n* A buffer overflow flaw was found in the Linux kernel\u0027s FUSE (Filesystem\nin Userspace) implementation. A local user in the fuse group who has access\nto mount a FUSE file system could use this flaw to cause a denial of\nservice. (CVE-2011-3353, Moderate)\n\n* A flaw was found in the b43 driver in the Linux kernel. If a system had\nan active wireless interface that uses the b43 driver, an attacker able to\nsend a specially-crafted frame to that interface could cause a denial of\nservice. (CVE-2011-3359, Moderate)\n\n* A flaw was found in the way CIFS shares with DFS referrals at their root\nwere handled. An attacker on the local network who is able to deploy a\nmalicious CIFS server could create a CIFS network share that, when mounted,\nwould cause the client system to crash. (CVE-2011-3363, Moderate)\n\n* A flaw was found in the way the Linux kernel handled VLAN 0 frames with\nthe priority tag set. When using certain network drivers, an attacker on\nthe local network could use this flaw to cause a denial of service.\n(CVE-2011-3593, Moderate)\n\n* A flaw in the way memory containing security-related data was handled in\ntpm_read() could allow a local, unprivileged user to read the results of a\npreviously run TPM command. (CVE-2011-1162, Low)\n\n* A heap overflow flaw was found in the Linux kernel\u0027s EFI GUID Partition\nTable (GPT) implementation. A local attacker could use this flaw to cause\na denial of service by mounting a disk that contains specially-crafted\npartition tables. (CVE-2011-1577, Low)\n\n* The I/O statistics from the taskstats subsystem could be read without\nany restrictions. A local, unprivileged user could use this flaw to gather\nconfidential information, such as the length of a password used in a\nprocess. (CVE-2011-2494, Low)\n\n* It was found that the perf tool, a part of the Linux kernel\u0027s Performance\nEvents implementation, could load its configuration file from the current\nworking directory. If a local user with access to the perf tool were\ntricked into running perf in a directory that contains a specially-crafted\nconfiguration file, it could cause perf to overwrite arbitrary files and\ndirectories accessible to that user. (CVE-2011-2905, Low)\n\nRed Hat would like to thank Fernando Gont for reporting CVE-2011-2699;\nDarren Lavender for reporting CVE-2011-3191; Dan Kaminsky for reporting\nCVE-2011-3188; Yogesh Sharma for reporting CVE-2011-3363; Gideon Naim for\nreporting CVE-2011-3593; Peter Huewe for reporting CVE-2011-1162; Timo\nWarns for reporting CVE-2011-1577; and Vasiliy Kulikov of Openwall for\nreporting CVE-2011-2494.\n\nThis update also fixes various bugs. Documentation for these changes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1465",
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.1_Technical_Notes/kernel.html#RHSA-2011-1465",
"url": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.1_Technical_Notes/kernel.html#RHSA-2011-1465"
},
{
"category": "external",
"summary": "695976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"category": "external",
"summary": "716842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=716842"
},
{
"category": "external",
"summary": "723429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723429"
},
{
"category": "external",
"summary": "729808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=729808"
},
{
"category": "external",
"summary": "732629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732629"
},
{
"category": "external",
"summary": "732658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732658"
},
{
"category": "external",
"summary": "732869",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732869"
},
{
"category": "external",
"summary": "736761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=736761"
},
{
"category": "external",
"summary": "738202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738202"
},
{
"category": "external",
"summary": "738291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738291"
},
{
"category": "external",
"summary": "740352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=740352"
},
{
"category": "external",
"summary": "741166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=741166"
},
{
"category": "external",
"summary": "742846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742846"
},
{
"category": "external",
"summary": "743807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=743807"
},
{
"category": "external",
"summary": "744811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=744811"
},
{
"category": "external",
"summary": "748808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=748808"
},
{
"category": "external",
"summary": "755584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=755584"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1465.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:39:14+00:00",
"generator": {
"date": "2025-11-21T17:39:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2011:1465",
"initial_release_date": "2011-11-22T16:36:00+00:00",
"revision_history": [
{
"date": "2011-11-22T16:36:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-11-22T16:45:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:39:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-131.21.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-131.21.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-131.21.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-131.21.1.el6.i686",
"product_id": "kernel-0:2.6.32-131.21.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-131.21.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-131.21.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-131.21.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-131.21.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-131.21.1.el6.i686",
"product_id": "perf-0:2.6.32-131.21.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-131.21.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-131.21.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-131.21.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-131.21.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-131.21.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-131.21.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-131.21.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-131.21.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-131.21.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-131.21.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-131.21.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-131.21.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-131.21.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-131.21.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-131.21.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-131.21.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-131.21.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-131.21.1.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-131.21.1.el6.ppc64",
"product_id": "kernel-0:2.6.32-131.21.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-131.21.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-131.21.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-131.21.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-131.21.1.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-131.21.1.el6.ppc64",
"product_id": "perf-0:2.6.32-131.21.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-131.21.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-131.21.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-131.21.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-131.21.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-131.21.1.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-131.21.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-131.21.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-131.21.1.el6.s390x",
"product_id": "kernel-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-131.21.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-131.21.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-131.21.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-131.21.1.el6.s390x",
"product_id": "perf-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-131.21.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-131.21.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-131.21.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-131.21.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-131.21.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-131.21.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-131.21.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-131.21.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-131.21.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-131.21.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-131.21.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-131.21.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-131.21.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-131.21.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-131.21.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-131.21.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-131.21.1.el6.x86_64",
"product_id": "perf-0:2.6.32-131.21.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-131.21.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-131.21.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-131.21.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-131.21.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-131.21.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-131.21.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-131.21.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-131.21.1.el6.src",
"product_id": "kernel-0:2.6.32-131.21.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-131.21.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-131.21.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-131.21.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-131.21.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-131.21.1.el6.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-131.21.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-131.21.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-131.21.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-131.21.1.el6.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-131.21.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-131.21.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-131.21.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-131.21.1.el6.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-131.21.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-131.21.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-131.21.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-131.21.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-131.21.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-131.21.1.el6.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-131.21.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-131.21.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-131.21.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-131.21.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-131.21.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-131.21.1.el6.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-131.21.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-131.21.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-131.21.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-131.21.1.el6.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-131.21.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-131.21.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-131.21.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-131.21.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-131.21.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-131.21.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Peter Huewe"
]
}
],
"cve": "CVE-2011-1162",
"discovery_date": "2011-03-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732629"
}
],
"notes": [
{
"category": "description",
"text": "The tpm_read function in the Linux kernel 2.6 does not properly clear memory, which might allow local users to read the results of the previous TPM command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tpm: infoleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1162"
},
{
"category": "external",
"summary": "RHBZ#732629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732629"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1162",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1162"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1162",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1162"
}
],
"release_date": "2011-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-22T16:36:00+00:00",
"details": "Users should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.2,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: tpm: infoleak"
},
{
"acknowledgments": [
{
"names": [
"Timo Warns"
]
}
],
"cve": "CVE-2011-1577",
"discovery_date": "2011-04-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "695976"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: corrupted GUID partition tables can cause kernel oops",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0833.html, https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1577"
},
{
"category": "external",
"summary": "RHBZ#695976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1577",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1577"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1577",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1577"
}
],
"release_date": "2011-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-22T16:36:00+00:00",
"details": "Users should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: corrupted GUID partition tables can cause kernel oops"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-2494",
"discovery_date": "2011-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "716842"
}
],
"notes": [
{
"category": "description",
"text": "kernel/taskstats.c in the Linux kernel before 3.1 allows local users to obtain sensitive I/O statistics by sending taskstats commands to a netlink socket, as demonstrated by discovering the length of another user\u0027s password.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: taskstats io infoleak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not provide support for the Taskstats interface. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1479.html, https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2012-0010.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2494"
},
{
"category": "external",
"summary": "RHBZ#716842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=716842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2494"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2494",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2494"
}
],
"release_date": "2011-06-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-22T16:36:00+00:00",
"details": "Users should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: taskstats io infoleak"
},
{
"acknowledgments": [
{
"names": [
"Fernando Gont"
]
}
],
"cve": "CVE-2011-2699",
"discovery_date": "2011-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "723429"
}
],
"notes": [
{
"category": "description",
"text": "The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: make fragment identifications less predictable",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the Linux kernel as shipped with Red Hat Enterprise MRG as it has backported the fix that addresses this issue. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates. This has been addressed in Red Hat Enterprise Linux 5 and 6 via https://rhn.redhat.com/errata/RHSA-2011-1386.html and https://rhn.redhat.com/errata/RHSA-2011-1465.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2699"
},
{
"category": "external",
"summary": "RHBZ#723429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723429"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2699",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2699"
}
],
"release_date": "2011-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-22T16:36:00+00:00",
"details": "Users should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: ipv6: make fragment identifications less predictable"
},
{
"cve": "CVE-2011-2905",
"discovery_date": "2011-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "729808"
}
],
"notes": [
{
"category": "description",
"text": "Untrusted search path vulnerability in the perf_config function in tools/perf/util/config.c in perf, as distributed in the Linux kernel before 3.1, allows local users to overwrite arbitrary files via a crafted config file in the current working directory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf tools: may parse user-controlled configuration file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect Red Hat Enterprise Linux 4 and 5 as they did not include support for perf. This did not affect Red Hat Enterprise MRG as it uses the perf package from Red Hat Enterprise Linux 6. This has been addressed in Red Hat Enterprise Linux 6 via https://rhn.redhat.com/errata/RHSA-2011-1465.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2905"
},
{
"category": "external",
"summary": "RHBZ#729808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=729808"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2905"
}
],
"release_date": "2011-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-22T16:36:00+00:00",
"details": "Users should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: perf tools: may parse user-controlled configuration file"
},
{
"acknowledgments": [
{
"names": [
"Dan Kaminsky"
]
}
],
"cve": "CVE-2011-3188",
"discovery_date": "2011-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732658"
}
],
"notes": [
{
"category": "description",
"text": "The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: improve sequence number generation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. It has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1386.html, https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2012-0010.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3188"
},
{
"category": "external",
"summary": "RHBZ#732658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732658"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3188"
}
],
"release_date": "2011-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-22T16:36:00+00:00",
"details": "Users should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: improve sequence number generation"
},
{
"acknowledgments": [
{
"names": [
"Darren Lavender"
]
}
],
"cve": "CVE-2011-3191",
"discovery_date": "2011-08-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "732869"
}
],
"notes": [
{
"category": "description",
"text": "Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel before 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read request for a directory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cifs: signedness issue in CIFSFindNext()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. It has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1386.html, https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2012-0010.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3191"
},
{
"category": "external",
"summary": "RHBZ#732869",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732869"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3191",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3191"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3191",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3191"
}
],
"release_date": "2011-08-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-22T16:36:00+00:00",
"details": "Users should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cifs: signedness issue in CIFSFindNext()"
},
{
"cve": "CVE-2011-3353",
"discovery_date": "2011-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "736761"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4 as they did not provide support for FUSE. This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 as they did not backport the upstream commit 3b463ae0c6264f that introduced this issue. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1465.html and https://rhn.redhat.com/errata/RHSA-2012-0010.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3353"
},
{
"category": "external",
"summary": "RHBZ#736761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=736761"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3353",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3353"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3353",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3353"
}
],
"release_date": "2011-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-22T16:36:00+00:00",
"details": "Users should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message"
},
{
"cve": "CVE-2011-3359",
"discovery_date": "2011-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "738202"
}
],
"notes": [
{
"category": "description",
"text": "The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: b43: allocate receive buffers big enough for max frame len + offset",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red\nHat Enterprise Linux 4 and 5 as they did not provide support for Broadcom 43xx wireless devices. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2012-0010.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3359"
},
{
"category": "external",
"summary": "RHBZ#738202",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738202"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3359",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3359"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3359",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3359"
}
],
"release_date": "2011-03-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-22T16:36:00+00:00",
"details": "Users should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: b43: allocate receive buffers big enough for max frame len + offset"
},
{
"acknowledgments": [
{
"names": [
"Yogesh Sharma"
]
}
],
"cve": "CVE-2011-3363",
"discovery_date": "2011-03-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "738291"
}
],
"notes": [
{
"category": "description",
"text": "The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cifs: always do is_path_accessible check in cifs_mount",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel as shipped with Red Hat Enterprise Linux 4,\n5, 6, and Red Hat Enterprise MRG. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1479.html, https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2012-0010.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3363"
},
{
"category": "external",
"summary": "RHBZ#738291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3363",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3363"
}
],
"release_date": "2011-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-22T16:36:00+00:00",
"details": "Users should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cifs: always do is_path_accessible check in cifs_mount"
},
{
"acknowledgments": [
{
"names": [
"Gideon Naim"
]
}
],
"cve": "CVE-2011-3593",
"discovery_date": "2011-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "742846"
}
],
"notes": [
{
"category": "description",
"text": "A certain Red Hat patch to the vlan_hwaccel_do_receive function in net/8021q/vlan_core.c in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows remote attackers to cause a denial of service (system crash) via priority-tagged VLAN frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vlan: fix panic when handling priority tagged frames",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG. It affects the Linux kernel as shipped with Red Hat Enterprise Linux 6 due to incorrect backporting of upstream patches. A future kernel update in Red Hat Enterprise Linux 6 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3593"
},
{
"category": "external",
"summary": "RHBZ#742846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3593",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3593"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3593",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3593"
}
],
"release_date": "2011-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-22T16:36:00+00:00",
"details": "Users should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: vlan: fix panic when handling priority tagged frames"
},
{
"cve": "CVE-2011-4326",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2011-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "755584"
}
],
"notes": [
{
"category": "description",
"text": "The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wrong headroom check in udp6_ufo_fragment()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 and 5 as they did not provide support for UDP Fragmentation Offload (UFO) functionality. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2012-0010.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4326"
},
{
"category": "external",
"summary": "RHBZ#755584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=755584"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4326",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4326"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4326",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4326"
}
],
"release_date": "2011-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-22T16:36:00+00:00",
"details": "Users should upgrade to these updated packages, which contain\nbackported patches to correct these issues, and fix the bugs noted in\nthe Technical Notes. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1465"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.src",
"6Server-6.1.z:kernel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-bootwrapper-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debug-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-debuginfo-common-i686-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-debuginfo-common-ppc64-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-debuginfo-common-s390x-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-debuginfo-common-x86_64-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-devel-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-doc-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-firmware-0:2.6.32-131.21.1.el6.noarch",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-headers-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:kernel-kdump-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:kernel-kdump-devel-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-0:2.6.32-131.21.1.el6.x86_64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.i686",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.ppc64",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.s390x",
"6Server-6.1.z:perf-debuginfo-0:2.6.32-131.21.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: wrong headroom check in udp6_ufo_fragment()"
}
]
}
RHSA-2011_0833
Vulnerability from csaf_redhat - Published: 2011-05-31 14:03 - Updated: 2024-11-22 05:35The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BNEPCONNADD command.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, and then reading a modprobe command line.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
Workaround
|
The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
Xen, possibly before 4.0.2, allows local 64-bit PV guests to cause a denial of service (host crash) by specifying user mode execution without user-mode pagetables.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the _ctl_do_mpt_command function in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier might allow local users to gain privileges or cause a denial of service (memory corruption) via an ioctl call specifying a crafted value that triggers a heap-based buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A flaw in the dccp_rcv_state_process() function could allow a remote\nattacker to cause a denial of service, even when the socket was already\nclosed. (CVE-2011-1093, Important)\n\n* Multiple buffer overflow flaws were found in the Linux kernel\u0027s\nManagement Module Support for Message Passing Technology (MPT) based\ncontrollers. A local, unprivileged user could use these flaws to cause a\ndenial of service, an information leak, or escalate their privileges.\n(CVE-2011-1494, CVE-2011-1495, Important)\n\n* A missing validation of a null-terminated string data structure element\nin the bnep_sock_ioctl() function could allow a local user to cause an\ninformation leak or a denial of service. (CVE-2011-1079, Moderate)\n\n* Missing error checking in the way page tables were handled in the Xen\nhypervisor implementation could allow a privileged guest user to cause the\nhost, and the guests, to lock up. (CVE-2011-1166, Moderate)\n\n* A flaw was found in the way the Xen hypervisor implementation checked for\nthe upper boundary when getting a new event channel port. A privileged\nguest user could use this flaw to cause a denial of service or escalate\ntheir privileges. (CVE-2011-1763, Moderate)\n\n* The start_code and end_code values in \"/proc/[pid]/stat\" were not\nprotected. In certain scenarios, this flaw could be used to defeat Address\nSpace Layout Randomization (ASLR). (CVE-2011-0726, Low)\n\n* A missing initialization flaw in the sco_sock_getsockopt() function could\nallow a local, unprivileged user to cause an information leak.\n(CVE-2011-1078, Low)\n\n* A missing validation of a null-terminated string data structure element\nin the do_replace() function could allow a local user who has the\nCAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1080, Low)\n\n* A buffer overflow flaw in the DEC Alpha OSF partition implementation in\nthe Linux kernel could allow a local attacker to cause an information leak\nby mounting a disk that contains specially-crafted partition tables.\n(CVE-2011-1163, Low)\n\n* Missing validations of null-terminated string data structure elements in\nthe do_replace(), compat_do_replace(), do_ipt_get_ctl(), do_ip6t_get_ctl(),\nand do_arpt_get_ctl() functions could allow a local user who has the\nCAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1170,\nCVE-2011-1171, CVE-2011-1172, Low)\n\n* A heap overflow flaw in the Linux kernel\u0027s EFI GUID Partition Table (GPT)\nimplementation could allow a local attacker to cause a denial of service\nby mounting a disk that contains specially-crafted partition tables.\n(CVE-2011-1577, Low)\n\nRed Hat would like to thank Dan Rosenberg for reporting CVE-2011-1494 and\nCVE-2011-1495; Vasiliy Kulikov for reporting CVE-2011-1079, CVE-2011-1078,\nCVE-2011-1080, CVE-2011-1170, CVE-2011-1171, and CVE-2011-1172; Kees Cook\nfor reporting CVE-2011-0726; and Timo Warns for reporting CVE-2011-1163\nand CVE-2011-1577.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues, and fix the bugs noted in the Technical\nNotes. The system must be rebooted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0833",
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html#RHSA-2011-0833",
"url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html#RHSA-2011-0833"
},
{
"category": "external",
"summary": "681259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681259"
},
{
"category": "external",
"summary": "681260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681260"
},
{
"category": "external",
"summary": "681262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681262"
},
{
"category": "external",
"summary": "682954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682954"
},
{
"category": "external",
"summary": "684569",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684569"
},
{
"category": "external",
"summary": "688021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688021"
},
{
"category": "external",
"summary": "688156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688156"
},
{
"category": "external",
"summary": "688579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688579"
},
{
"category": "external",
"summary": "689321",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689321"
},
{
"category": "external",
"summary": "689327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689327"
},
{
"category": "external",
"summary": "689345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689345"
},
{
"category": "external",
"summary": "689699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689699"
},
{
"category": "external",
"summary": "689700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689700"
},
{
"category": "external",
"summary": "690134",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=690134"
},
{
"category": "external",
"summary": "690239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=690239"
},
{
"category": "external",
"summary": "694021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694021"
},
{
"category": "external",
"summary": "695976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"category": "external",
"summary": "696136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=696136"
},
{
"category": "external",
"summary": "697448",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=697448"
},
{
"category": "external",
"summary": "699808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699808"
},
{
"category": "external",
"summary": "701240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=701240"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0833.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T05:35:52+00:00",
"generator": {
"date": "2024-11-22T05:35:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0833",
"initial_release_date": "2011-05-31T14:03:00+00:00",
"revision_history": [
{
"date": "2011-05-31T14:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-05-31T10:05:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T05:35:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.12.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-238.12.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-238.12.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-238.12.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.12.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.12.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-238.12.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.12.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.12.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.12.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.12.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-238.12.1.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.12.1.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.12.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-238.12.1.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.12.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.12.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.12.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-238.12.1.el5.src",
"product_id": "kernel-0:2.6.18-238.12.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.12.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-238.12.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.12.1.el5.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-238.12.1.el5.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-238.12.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-238.12.1.el5.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Kees Cook"
]
}
],
"cve": "CVE-2011-0726",
"discovery_date": "2011-03-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "684569"
}
],
"notes": [
{
"category": "description",
"text": "The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: proc: protect mm start_code/end_code in /proc/pid/stat",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle,\nhttps://access.redhat.com/support/policy/updates/errata/, therefore the fix for\nthis issue is not currently planned to be included in the future updates. Future kernel updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0726"
},
{
"category": "external",
"summary": "RHBZ#684569",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=684569"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0726",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0726"
}
],
"release_date": "2011-03-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: proc: protect mm start_code/end_code in /proc/pid/stat"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1078",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "681259"
}
],
"notes": [
{
"category": "description",
"text": "The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bt sco_conninfo infoleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1078"
},
{
"category": "external",
"summary": "RHBZ#681259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681259"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1078",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1078"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1078",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1078"
}
],
"release_date": "2011-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: bt sco_conninfo infoleak"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1079",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "681260"
}
],
"notes": [
{
"category": "description",
"text": "The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a \u0027\\0\u0027 character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BNEPCONNADD command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bnep device field missing NULL terminator",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1079"
},
{
"category": "external",
"summary": "RHBZ#681260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1079"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1079",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1079"
}
],
"release_date": "2011-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bnep device field missing NULL terminator"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1080",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "681262"
}
],
"notes": [
{
"category": "description",
"text": "The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a \u0027\\0\u0027 character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, and then reading a modprobe command line.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ebtables stack infoleak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1080"
},
{
"category": "external",
"summary": "RHBZ#681262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681262"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1080",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1080"
}
],
"release_date": "2011-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ebtables stack infoleak"
},
{
"cve": "CVE-2011-1093",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2011-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682954"
}
],
"notes": [
{
"category": "description",
"text": "The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dccp: fix oops on Reset after close",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not include support for the DCCP protocol. Future updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1093"
},
{
"category": "external",
"summary": "RHBZ#682954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1093"
}
],
"release_date": "2011-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
},
{
"category": "workaround",
"details": "For users that do not run applications that use DCCP, you can prevent the dccp\nmodule from being loaded by adding the following entry to the end of the\n/etc/modprobe.d/blacklist file:\n\nblacklist dccp\n\nThis way, the dccp module cannot be loaded accidentally, which may occur if an\napplication that requires DCCP is started. A reboot is not necessary for this\nchange to take effect but do make sure the module is not loaded in the first\nplace. You can verify that by running:\n\nlsmod | grep dccp\n\nYou may also consider removing the CAP_SYS_MODULE capability from the current\nglobal capability set to prevent kernel modules from being loaded or unloaded.\nThe CAP_SYS_MODULE has a capability number of 16 (see linux/capability.h). The\ndefault value has all the bits set. To remove this capability, you have to\nclear the 16th bit of the default 32-bit value, e.g. 0xffffff ^ (1 \u003c\u003c 16):\n\necho 0xFFFEFFFF \u003e /proc/sys/kernel/cap-bound",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: dccp: fix oops on Reset after close"
},
{
"acknowledgments": [
{
"names": [
"Timo Warns"
]
}
],
"cve": "CVE-2011-1163",
"discovery_date": "2011-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "688021"
}
],
"notes": [
{
"category": "description",
"text": "The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fs/partitions: Corrupted OSF partition table infoleak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0833.html, https://rhn.redhat.com/errata/RHSA-2011-0542.html, and https://rhn.redhat.com/errata/RHSA-2011-0500.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for\nthis issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1163"
},
{
"category": "external",
"summary": "RHBZ#688021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1163",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1163"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1163",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1163"
}
],
"release_date": "2011-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: fs/partitions: Corrupted OSF partition table infoleak"
},
{
"cve": "CVE-2011-1166",
"discovery_date": "2011-03-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "688579"
}
],
"notes": [
{
"category": "description",
"text": "Xen, possibly before 4.0.2, allows local 64-bit PV guests to cause a denial of service (host crash) by specifying user mode execution without user-mode pagetables.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xen: x86_64: fix error checking in arch_set_info_guest()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1166"
},
{
"category": "external",
"summary": "RHBZ#688579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=688579"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1166",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1166"
}
],
"release_date": "2011-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xen: x86_64: fix error checking in arch_set_info_guest()"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1170",
"discovery_date": "2011-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "689321"
}
],
"notes": [
{
"category": "description",
"text": "net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected \u0027\\0\u0027 character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv4: netfilter: arp_tables: fix infoleak to userspace",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance\nlife-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore\nthe fix for this issue is not currently planned to be included in the future\nupdates. Future kernel updates in Red Hat Enterprise Linux 5, 6 and Red Hat\nEnterprise MRG may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1170"
},
{
"category": "external",
"summary": "RHBZ#689321",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689321"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1170"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1170",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1170"
}
],
"release_date": "2011-03-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ipv4: netfilter: arp_tables: fix infoleak to userspace"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1171",
"discovery_date": "2011-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "689327"
}
],
"notes": [
{
"category": "description",
"text": "net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected \u0027\\0\u0027 character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv4: netfilter: ip_tables: fix infoleak to userspace",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance\nlife-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates. Future kernel updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1171"
},
{
"category": "external",
"summary": "RHBZ#689327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1171",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1171"
}
],
"release_date": "2011-03-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ipv4: netfilter: ip_tables: fix infoleak to userspace"
},
{
"acknowledgments": [
{
"names": [
"Vasiliy Kulikov"
],
"organization": "Openwall"
}
],
"cve": "CVE-2011-1172",
"discovery_date": "2011-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "689345"
}
],
"notes": [
{
"category": "description",
"text": "net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected \u0027\\0\u0027 character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ipv6: netfilter: ip6_tables: fix infoleak to userspace",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle,\nhttps://access.redhat.com/support/policy/updates/errata/, therefore the fix for\nthis issue is not currently planned to be included in the future updates. Future kernel updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise\nMRG may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1172"
},
{
"category": "external",
"summary": "RHBZ#689345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1172"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1172",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1172"
}
],
"release_date": "2011-03-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: ipv6: netfilter: ip6_tables: fix infoleak to userspace"
},
{
"acknowledgments": [
{
"names": [
"Dan Rosenberg"
]
}
],
"cve": "CVE-2011-1494",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2011-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "694021"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the _ctl_do_mpt_command function in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier might allow local users to gain privileges or cause a denial of service (memory corruption) via an ioctl call specifying a crafted value that triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drivers/scsi/mpt2sas: prevent heap overflows",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as it did not provide support for MPT (Message Passing\nTechnology) based controllers. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0833.html, and https://rhn.redhat.com/errata/RHSA-2011-0542.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1494"
},
{
"category": "external",
"summary": "RHBZ#694021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1494"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1494",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1494"
}
],
"release_date": "2011-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: drivers/scsi/mpt2sas: prevent heap overflows"
},
{
"acknowledgments": [
{
"names": [
"Dan Rosenberg"
]
}
],
"cve": "CVE-2011-1495",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2011-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "694021"
}
],
"notes": [
{
"category": "description",
"text": "drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drivers/scsi/mpt2sas: prevent heap overflows",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as it did not provide support for MPT (Message Passing\nTechnology) based controllers. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0833.html, and https://rhn.redhat.com/errata/RHSA-2011-0542.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1495"
},
{
"category": "external",
"summary": "RHBZ#694021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=694021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1495",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1495"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1495",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1495"
}
],
"release_date": "2011-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: drivers/scsi/mpt2sas: prevent heap overflows"
},
{
"acknowledgments": [
{
"names": [
"Timo Warns"
]
}
],
"cve": "CVE-2011-1577",
"discovery_date": "2011-04-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "695976"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: corrupted GUID partition tables can cause kernel oops",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0833.html, https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1577"
},
{
"category": "external",
"summary": "RHBZ#695976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=695976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1577",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1577"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1577",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1577"
}
],
"release_date": "2011-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: corrupted GUID partition tables can cause kernel oops"
},
{
"cve": "CVE-2011-1763",
"discovery_date": "2011-04-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "701240"
}
],
"notes": [
{
"category": "description",
"text": "The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: xen: improper upper boundary check in get_free_port() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects Red Hat Enterprise Linux 5 as we did not backport upstream Xen unstable commit 2dcdd2fcb945. The versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1763"
},
{
"category": "external",
"summary": "RHBZ#701240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=701240"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1763",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1763"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1763",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1763"
}
],
"release_date": "2011-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:03:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.",
"product_ids": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0833"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.src",
"5Server-5.6.Z:kernel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-PAE-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-PAE-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debug-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-debuginfo-common-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-devel-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-doc-0:2.6.18-238.12.1.el5.noarch",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.i386",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-headers-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-debuginfo-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.ppc64",
"5Server-5.6.Z:kernel-kdump-devel-0:2.6.18-238.12.1.el5.s390x",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-debuginfo-0:2.6.18-238.12.1.el5.x86_64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.i686",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.ia64",
"5Server-5.6.Z:kernel-xen-devel-0:2.6.18-238.12.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: xen: improper upper boundary check in get_free_port() function"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.