SUSE-SU-2016:2074-1

Vulnerability from csaf_suse - Published: 2016-08-15 10:48 - Updated: 2016-08-15 10:48
Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch: The SUSE Linux Enterprise 11 SP2 kernel was updated to receive various security and bug fixes. The following security bugs were fixed: - CVE-2016-4486: Fixed 4 byte information leak in net/core/rtnetlink.c (bsc#978822). - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126). - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948). - CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956). - CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911). - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970). - CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892). - CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958). - CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124). - CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360). - CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125). - CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909). - CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504). - CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670). - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010). - CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint (bnc#961512). - CVE-2016-2549: sound/core/hrtimer.c in the Linux kernel did not prevent recursive callback access, which allowed local users to cause a denial of service (deadlock) via a crafted ioctl call (bnc#968013). - CVE-2016-2547: sound/core/timer.c in the Linux kernel employed a locking approach that did not consider slave timer instances, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#968011). - CVE-2016-2548: sound/core/timer.c in the Linux kernel retained certain linked lists after a close or stop action, which allowed local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions (bnc#968012). - CVE-2016-2546: sound/core/timer.c in the Linux kernel used an incorrect type of mutex, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#967975). - CVE-2016-2545: The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel did not properly maintain a certain linked list, which allowed local users to cause a denial of service (race condition and system crash) via a crafted ioctl call (bnc#967974). - CVE-2016-2544: Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time (bnc#967973). - CVE-2016-2543: The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel did not verify FIFO assignment before proceeding with FIFO clearing, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call (bnc#967972). - CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor (bnc#966693). - CVE-2015-8812: drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel did not properly identify error conditions, which allowed remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets (bnc#966437). - CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765). - CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel .4.1 allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767). - CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call (bnc#961500). - CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654). - CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service (deadlock) via a crafted sctp_accept call (bnc#961509). - CVE-2015-7515: The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints (bnc#956708). - CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272 (bnc#955354). - CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls (bnc#958951). - CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190). - CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959399). - CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886). - CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463). - CVE-2015-7509: fs/ext4/namei.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015 (bnc#956709). - CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936). - CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404). - CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527). - CVE-2015-7990: Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#952384). - CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440). - CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825). - CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation (bnc#942367). - CVE-2015-3339: Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel allowed local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped (bnc#928130). The following non-security bugs were fixed: - Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201). - Fix lpfc_send_rscn_event allocation size claims bnc#935757 - Fix ntpd clock synchronization in Xen PV domains (bnc#816446). - Fix vmalloc_fault oops during lazy MMU updates (bsc#948562). - Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309). - SCSI: bfa: Fix to handle firmware tskim abort request response (bsc#972510). - USB: usbip: fix potential out-of-bounds write (bnc#975945). - af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570). - dm-snap: avoid deadock on s->lock when a read is split (bsc#939826). - mm/hugetlb: check for pte NULL pointer in __page_check_address() (bsc#977847). - nf_conntrack: fix bsc#758540 kabi fix (bsc#946117). - privcmd: allow preempting long running user-mode originating hypercalls (bnc#861093). - s390/cio: collect format 1 channel-path description data (bsc#966460, bsc#966662). - s390/cio: ensure consistent measurement state (bsc#966460, bsc#966662). - s390/cio: fix measurement characteristics memleak (bsc#966460, bsc#966662). - s390/cio: update measurement characteristics (bsc#966460, bsc#966662). - xfs: Fix lost direct IO write in the last block (bsc#949744).
Patchnames: slessp2-kernel-source-12693
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-security-upd… self
https://bugzilla.suse.com/816446 self
https://bugzilla.suse.com/861093 self
https://bugzilla.suse.com/928130 self
https://bugzilla.suse.com/935757 self
https://bugzilla.suse.com/939826 self
https://bugzilla.suse.com/942367 self
https://bugzilla.suse.com/945825 self
https://bugzilla.suse.com/946117 self
https://bugzilla.suse.com/946309 self
https://bugzilla.suse.com/948562 self
https://bugzilla.suse.com/949744 self
https://bugzilla.suse.com/949936 self
https://bugzilla.suse.com/951440 self
https://bugzilla.suse.com/952384 self
https://bugzilla.suse.com/953527 self
https://bugzilla.suse.com/954404 self
https://bugzilla.suse.com/955354 self
https://bugzilla.suse.com/955654 self
https://bugzilla.suse.com/956708 self
https://bugzilla.suse.com/956709 self
https://bugzilla.suse.com/958463 self
https://bugzilla.suse.com/958886 self
https://bugzilla.suse.com/958951 self
https://bugzilla.suse.com/959190 self
https://bugzilla.suse.com/959399 self
https://bugzilla.suse.com/961500 self
https://bugzilla.suse.com/961509 self
https://bugzilla.suse.com/961512 self
https://bugzilla.suse.com/963765 self
https://bugzilla.suse.com/963767 self
https://bugzilla.suse.com/964201 self
https://bugzilla.suse.com/966437 self
https://bugzilla.suse.com/966460 self
https://bugzilla.suse.com/966662 self
https://bugzilla.suse.com/966693 self
https://bugzilla.suse.com/967972 self
https://bugzilla.suse.com/967973 self
https://bugzilla.suse.com/967974 self
https://bugzilla.suse.com/967975 self
https://bugzilla.suse.com/968010 self
https://bugzilla.suse.com/968011 self
https://bugzilla.suse.com/968012 self
https://bugzilla.suse.com/968013 self
https://bugzilla.suse.com/968670 self
https://bugzilla.suse.com/970504 self
https://bugzilla.suse.com/970892 self
https://bugzilla.suse.com/970909 self
https://bugzilla.suse.com/970911 self
https://bugzilla.suse.com/970948 self
https://bugzilla.suse.com/970956 self
https://bugzilla.suse.com/970958 self
https://bugzilla.suse.com/970970 self
https://bugzilla.suse.com/971124 self
https://bugzilla.suse.com/971125 self
https://bugzilla.suse.com/971126 self
https://bugzilla.suse.com/971360 self
https://bugzilla.suse.com/972510 self
https://bugzilla.suse.com/973570 self
https://bugzilla.suse.com/975945 self
https://bugzilla.suse.com/977847 self
https://bugzilla.suse.com/978822 self
https://www.suse.com/security/cve/CVE-2013-2015/ self
https://www.suse.com/security/cve/CVE-2013-7446/ self
https://www.suse.com/security/cve/CVE-2015-0272/ self
https://www.suse.com/security/cve/CVE-2015-3339/ self
https://www.suse.com/security/cve/CVE-2015-5307/ self
https://www.suse.com/security/cve/CVE-2015-6252/ self
https://www.suse.com/security/cve/CVE-2015-6937/ self
https://www.suse.com/security/cve/CVE-2015-7509/ self
https://www.suse.com/security/cve/CVE-2015-7515/ self
https://www.suse.com/security/cve/CVE-2015-7550/ self
https://www.suse.com/security/cve/CVE-2015-7566/ self
https://www.suse.com/security/cve/CVE-2015-7799/ self
https://www.suse.com/security/cve/CVE-2015-7872/ self
https://www.suse.com/security/cve/CVE-2015-7990/ self
https://www.suse.com/security/cve/CVE-2015-8104/ self
https://www.suse.com/security/cve/CVE-2015-8215/ self
https://www.suse.com/security/cve/CVE-2015-8539/ self
https://www.suse.com/security/cve/CVE-2015-8543/ self
https://www.suse.com/security/cve/CVE-2015-8569/ self
https://www.suse.com/security/cve/CVE-2015-8575/ self
https://www.suse.com/security/cve/CVE-2015-8767/ self
https://www.suse.com/security/cve/CVE-2015-8785/ self
https://www.suse.com/security/cve/CVE-2015-8812/ self
https://www.suse.com/security/cve/CVE-2015-8816/ self
https://www.suse.com/security/cve/CVE-2016-0723/ self
https://www.suse.com/security/cve/CVE-2016-2069/ self
https://www.suse.com/security/cve/CVE-2016-2143/ self
https://www.suse.com/security/cve/CVE-2016-2184/ self
https://www.suse.com/security/cve/CVE-2016-2185/ self
https://www.suse.com/security/cve/CVE-2016-2186/ self
https://www.suse.com/security/cve/CVE-2016-2188/ self
https://www.suse.com/security/cve/CVE-2016-2384/ self
https://www.suse.com/security/cve/CVE-2016-2543/ self
https://www.suse.com/security/cve/CVE-2016-2544/ self
https://www.suse.com/security/cve/CVE-2016-2545/ self
https://www.suse.com/security/cve/CVE-2016-2546/ self
https://www.suse.com/security/cve/CVE-2016-2547/ self
https://www.suse.com/security/cve/CVE-2016-2548/ self
https://www.suse.com/security/cve/CVE-2016-2549/ self
https://www.suse.com/security/cve/CVE-2016-2782/ self
https://www.suse.com/security/cve/CVE-2016-2847/ self
https://www.suse.com/security/cve/CVE-2016-3134/ self
https://www.suse.com/security/cve/CVE-2016-3137/ self
https://www.suse.com/security/cve/CVE-2016-3138/ self
https://www.suse.com/security/cve/CVE-2016-3139/ self
https://www.suse.com/security/cve/CVE-2016-3140/ self
https://www.suse.com/security/cve/CVE-2016-3156/ self
https://www.suse.com/security/cve/CVE-2016-4486/ self
https://www.suse.com/security/cve/CVE-2013-2015 external
https://bugzilla.suse.com/817377 external
https://www.suse.com/security/cve/CVE-2013-7446 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/955654 external
https://bugzilla.suse.com/955837 external
https://www.suse.com/security/cve/CVE-2015-0272 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/944296 external
https://bugzilla.suse.com/951638 external
https://bugzilla.suse.com/955354 external
https://www.suse.com/security/cve/CVE-2015-3339 external
https://bugzilla.suse.com/903967 external
https://bugzilla.suse.com/928130 external
https://bugzilla.suse.com/939263 external
https://www.suse.com/security/cve/CVE-2015-5307 external
https://bugzilla.suse.com/953527 external
https://bugzilla.suse.com/954018 external
https://bugzilla.suse.com/954404 external
https://bugzilla.suse.com/954405 external
https://bugzilla.suse.com/962977 external
https://www.suse.com/security/cve/CVE-2015-6252 external
https://bugzilla.suse.com/942367 external
https://www.suse.com/security/cve/CVE-2015-6937 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/923755 external
https://bugzilla.suse.com/945825 external
https://bugzilla.suse.com/952384 external
https://bugzilla.suse.com/953052 external
https://bugzilla.suse.com/963994 external
https://www.suse.com/security/cve/CVE-2015-7509 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/956707 external
https://bugzilla.suse.com/956709 external
https://bugzilla.suse.com/956766 external
https://www.suse.com/security/cve/CVE-2015-7515 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/956708 external
https://www.suse.com/security/cve/CVE-2015-7550 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/1052256 external
https://bugzilla.suse.com/958951 external
https://www.suse.com/security/cve/CVE-2015-7566 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/961512 external
https://www.suse.com/security/cve/CVE-2015-7799 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/1052256 external
https://bugzilla.suse.com/949936 external
https://bugzilla.suse.com/951638 external
https://www.suse.com/security/cve/CVE-2015-7872 external
https://bugzilla.suse.com/951440 external
https://bugzilla.suse.com/951542 external
https://bugzilla.suse.com/951638 external
https://bugzilla.suse.com/958463 external
https://bugzilla.suse.com/958601 external
https://www.suse.com/security/cve/CVE-2015-7990 external
https://bugzilla.suse.com/945825 external
https://bugzilla.suse.com/952384 external
https://bugzilla.suse.com/953052 external
https://www.suse.com/security/cve/CVE-2015-8104 external
https://bugzilla.suse.com/1215748 external
https://bugzilla.suse.com/953527 external
https://bugzilla.suse.com/954018 external
https://bugzilla.suse.com/954404 external
https://bugzilla.suse.com/954405 external
https://bugzilla.suse.com/962977 external
https://www.suse.com/security/cve/CVE-2015-8215 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/1052256 external
https://bugzilla.suse.com/944296 external
https://bugzilla.suse.com/951638 external
https://bugzilla.suse.com/955354 external
https://www.suse.com/security/cve/CVE-2015-8539 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/781018 external
https://bugzilla.suse.com/958463 external
https://bugzilla.suse.com/958601 external
https://www.suse.com/security/cve/CVE-2015-8543 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/1052256 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/923755 external
https://bugzilla.suse.com/958886 external
https://bugzilla.suse.com/963994 external
https://bugzilla.suse.com/969522 external
https://www.suse.com/security/cve/CVE-2015-8569 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/923755 external
https://bugzilla.suse.com/959190 external
https://bugzilla.suse.com/959399 external
https://bugzilla.suse.com/963994 external
https://www.suse.com/security/cve/CVE-2015-8575 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/959190 external
https://bugzilla.suse.com/959399 external
https://www.suse.com/security/cve/CVE-2015-8767 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/961509 external
https://www.suse.com/security/cve/CVE-2015-8785 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/963765 external
https://www.suse.com/security/cve/CVE-2015-8812 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/966437 external
https://bugzilla.suse.com/966683 external
https://www.suse.com/security/cve/CVE-2015-8816 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/968010 external
https://bugzilla.suse.com/979064 external
https://www.suse.com/security/cve/CVE-2016-0723 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/961500 external
https://www.suse.com/security/cve/CVE-2016-2069 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/870618 external
https://bugzilla.suse.com/963767 external
https://www.suse.com/security/cve/CVE-2016-2143 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/970504 external
https://bugzilla.suse.com/993872 external
https://www.suse.com/security/cve/CVE-2016-2184 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/971125 external
https://www.suse.com/security/cve/CVE-2016-2185 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/971124 external
https://www.suse.com/security/cve/CVE-2016-2186 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/970958 external
https://www.suse.com/security/cve/CVE-2016-2188 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/1067912 external
https://bugzilla.suse.com/1132190 external
https://bugzilla.suse.com/970956 external
https://www.suse.com/security/cve/CVE-2016-2384 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/966693 external
https://bugzilla.suse.com/967773 external
https://www.suse.com/security/cve/CVE-2016-2543 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/967972 external
https://www.suse.com/security/cve/CVE-2016-2544 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/967973 external
https://www.suse.com/security/cve/CVE-2016-2545 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/967974 external
https://www.suse.com/security/cve/CVE-2016-2546 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/967975 external
https://www.suse.com/security/cve/CVE-2016-2547 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/968011 external
https://www.suse.com/security/cve/CVE-2016-2548 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/968012 external
https://www.suse.com/security/cve/CVE-2016-2549 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/968013 external
https://www.suse.com/security/cve/CVE-2016-2782 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/961512 external
https://bugzilla.suse.com/968670 external
https://www.suse.com/security/cve/CVE-2016-2847 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/970948 external
https://bugzilla.suse.com/974646 external
https://www.suse.com/security/cve/CVE-2016-3134 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/1052256 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/971126 external
https://bugzilla.suse.com/971793 external
https://bugzilla.suse.com/986362 external
https://bugzilla.suse.com/986365 external
https://bugzilla.suse.com/986377 external
https://www.suse.com/security/cve/CVE-2016-3137 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/970970 external
https://www.suse.com/security/cve/CVE-2016-3138 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/970911 external
https://bugzilla.suse.com/970970 external
https://www.suse.com/security/cve/CVE-2016-3139 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/970909 external
https://www.suse.com/security/cve/CVE-2016-3140 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/970892 external
https://www.suse.com/security/cve/CVE-2016-3156 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/971360 external
https://www.suse.com/security/cve/CVE-2016-4486 external
https://bugzilla.suse.com/1020452 external
https://bugzilla.suse.com/978822 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 11 SP2 kernel was updated to receive various security and bug fixes.\n\nThe following security bugs were fixed:\n- CVE-2016-4486: Fixed 4 byte information leak in net/core/rtnetlink.c (bsc#978822).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).\n- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).\n- CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911).\n- CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970).\n- CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892).\n- CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958).\n- CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124).\n- CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).\n- CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125).\n- CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909).\n- CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504).\n- CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).\n- CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010).\n- CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint (bnc#961512).\n- CVE-2016-2549: sound/core/hrtimer.c in the Linux kernel did not prevent recursive callback access, which allowed local users to cause a denial of service (deadlock) via a crafted ioctl call (bnc#968013).\n- CVE-2016-2547: sound/core/timer.c in the Linux kernel employed a locking approach that did not consider slave timer instances, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#968011).\n- CVE-2016-2548: sound/core/timer.c in the Linux kernel retained certain linked lists after a close or stop action, which allowed local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions (bnc#968012).\n- CVE-2016-2546: sound/core/timer.c in the Linux kernel used an incorrect type of mutex, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#967975).\n- CVE-2016-2545: The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel did not properly maintain a certain linked list, which allowed local users to cause a denial of service (race condition and system crash) via a crafted ioctl call (bnc#967974).\n- CVE-2016-2544: Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time (bnc#967973).\n- CVE-2016-2543: The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel did not verify FIFO assignment before proceeding with FIFO clearing, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call (bnc#967972).\n- CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor (bnc#966693).\n- CVE-2015-8812: drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel did not properly identify error conditions, which allowed remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets (bnc#966437).\n- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765).\n- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel .4.1 allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).\n- CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call (bnc#961500).\n- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654).\n- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service (deadlock) via a crafted sctp_accept call (bnc#961509).\n- CVE-2015-7515: The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints (bnc#956708).\n- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272 (bnc#955354).\n- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls (bnc#958951).\n- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).\n- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959399).\n- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).\n- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).\n- CVE-2015-7509: fs/ext4/namei.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015 (bnc#956709).\n- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).\n- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).\n- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).\n- CVE-2015-7990: Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#952384).\n- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).\n- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).\n- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation (bnc#942367).\n- CVE-2015-3339: Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel allowed local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped (bnc#928130).\n\nThe following non-security bugs were fixed:\n- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).\n- Fix lpfc_send_rscn_event allocation size claims bnc#935757\n- Fix ntpd clock synchronization in Xen PV domains (bnc#816446).\n- Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).\n- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).\n- SCSI: bfa: Fix to handle firmware tskim abort request response (bsc#972510).\n- USB: usbip: fix potential out-of-bounds write (bnc#975945).\n- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).\n- dm-snap: avoid deadock on s-\u003elock when a read is split (bsc#939826).\n- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bsc#977847).\n- nf_conntrack: fix bsc#758540 kabi fix (bsc#946117).\n- privcmd: allow preempting long running user-mode originating hypercalls (bnc#861093).\n- s390/cio: collect format 1 channel-path description data (bsc#966460, bsc#966662).\n- s390/cio: ensure consistent measurement state (bsc#966460, bsc#966662).\n- s390/cio: fix measurement characteristics memleak (bsc#966460, bsc#966662).\n- s390/cio: update measurement characteristics (bsc#966460, bsc#966662).\n- xfs: Fix lost direct IO write in the last block (bsc#949744).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "slessp2-kernel-source-12693",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2074-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2016:2074-1",
        "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162074-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2016:2074-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 816446",
        "url": "https://bugzilla.suse.com/816446"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 861093",
        "url": "https://bugzilla.suse.com/861093"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 928130",
        "url": "https://bugzilla.suse.com/928130"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 935757",
        "url": "https://bugzilla.suse.com/935757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 939826",
        "url": "https://bugzilla.suse.com/939826"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 942367",
        "url": "https://bugzilla.suse.com/942367"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 945825",
        "url": "https://bugzilla.suse.com/945825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 946117",
        "url": "https://bugzilla.suse.com/946117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 946309",
        "url": "https://bugzilla.suse.com/946309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 948562",
        "url": "https://bugzilla.suse.com/948562"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 949744",
        "url": "https://bugzilla.suse.com/949744"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 949936",
        "url": "https://bugzilla.suse.com/949936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 951440",
        "url": "https://bugzilla.suse.com/951440"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 952384",
        "url": "https://bugzilla.suse.com/952384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 953527",
        "url": "https://bugzilla.suse.com/953527"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 954404",
        "url": "https://bugzilla.suse.com/954404"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 955354",
        "url": "https://bugzilla.suse.com/955354"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 955654",
        "url": "https://bugzilla.suse.com/955654"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 956708",
        "url": "https://bugzilla.suse.com/956708"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 956709",
        "url": "https://bugzilla.suse.com/956709"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 958463",
        "url": "https://bugzilla.suse.com/958463"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 958886",
        "url": "https://bugzilla.suse.com/958886"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 958951",
        "url": "https://bugzilla.suse.com/958951"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 959190",
        "url": "https://bugzilla.suse.com/959190"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 959399",
        "url": "https://bugzilla.suse.com/959399"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 961500",
        "url": "https://bugzilla.suse.com/961500"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 961509",
        "url": "https://bugzilla.suse.com/961509"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 961512",
        "url": "https://bugzilla.suse.com/961512"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 963765",
        "url": "https://bugzilla.suse.com/963765"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 963767",
        "url": "https://bugzilla.suse.com/963767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 964201",
        "url": "https://bugzilla.suse.com/964201"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 966437",
        "url": "https://bugzilla.suse.com/966437"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 966460",
        "url": "https://bugzilla.suse.com/966460"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 966662",
        "url": "https://bugzilla.suse.com/966662"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 966693",
        "url": "https://bugzilla.suse.com/966693"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 967972",
        "url": "https://bugzilla.suse.com/967972"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 967973",
        "url": "https://bugzilla.suse.com/967973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 967974",
        "url": "https://bugzilla.suse.com/967974"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 967975",
        "url": "https://bugzilla.suse.com/967975"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 968010",
        "url": "https://bugzilla.suse.com/968010"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 968011",
        "url": "https://bugzilla.suse.com/968011"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 968012",
        "url": "https://bugzilla.suse.com/968012"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 968013",
        "url": "https://bugzilla.suse.com/968013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 968670",
        "url": "https://bugzilla.suse.com/968670"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 970504",
        "url": "https://bugzilla.suse.com/970504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 970892",
        "url": "https://bugzilla.suse.com/970892"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 970909",
        "url": "https://bugzilla.suse.com/970909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 970911",
        "url": "https://bugzilla.suse.com/970911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 970948",
        "url": "https://bugzilla.suse.com/970948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 970956",
        "url": "https://bugzilla.suse.com/970956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 970958",
        "url": "https://bugzilla.suse.com/970958"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 970970",
        "url": "https://bugzilla.suse.com/970970"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 971124",
        "url": "https://bugzilla.suse.com/971124"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 971125",
        "url": "https://bugzilla.suse.com/971125"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 971126",
        "url": "https://bugzilla.suse.com/971126"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 971360",
        "url": "https://bugzilla.suse.com/971360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 972510",
        "url": "https://bugzilla.suse.com/972510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 973570",
        "url": "https://bugzilla.suse.com/973570"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 975945",
        "url": "https://bugzilla.suse.com/975945"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 977847",
        "url": "https://bugzilla.suse.com/977847"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 978822",
        "url": "https://bugzilla.suse.com/978822"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-2015 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-2015/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2013-7446 page",
        "url": "https://www.suse.com/security/cve/CVE-2013-7446/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-0272 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-0272/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-3339 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-3339/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-5307 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-5307/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-6252 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-6252/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-6937 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-6937/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7509 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7509/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7515 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7515/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7550 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7550/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7566 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7566/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7799 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7799/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7872 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7872/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7990 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7990/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8104 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8104/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8215 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8215/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8539 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8539/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8543 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8569 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8569/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8575 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8575/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8767 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8785 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8785/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8812 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8812/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8816 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8816/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-0723 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-0723/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2069 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2069/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2143 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2143/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2184 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2184/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2185 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2185/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2186 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2186/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2188 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2384 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2384/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2543 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2544 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2544/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2545 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2545/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2546 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2546/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2547 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2547/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2548 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2548/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2549 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2549/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2782 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2782/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2847 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2847/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3134 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3134/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3137 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3137/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3138 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3138/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3139 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3139/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3140 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3140/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3156 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3156/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-4486 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-4486/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2016-08-15T10:48:57Z",
      "generator": {
        "date": "2016-08-15T10:48:57Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2016:2074-1",
      "initial_release_date": "2016-08-15T10:48:57Z",
      "revision_history": [
        {
          "date": "2016-08-15T10:48:57Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-default-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-default-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-default-base-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-default-base-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-default-devel-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-default-devel-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-ec2-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-ec2-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-base-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-ec2-base-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-ec2-base-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-devel-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-ec2-devel-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-ec2-devel-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-pae-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-pae-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-pae-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-pae-base-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-pae-base-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-pae-base-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-pae-devel-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-pae-devel-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-pae-devel-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-source-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-source-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-syms-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-syms-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-trace-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-trace-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-base-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-trace-base-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-trace-base-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-devel-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-trace-devel-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-trace-devel-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-xen-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-xen-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-base-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-xen-base-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-xen-base-3.0.101-0.7.40.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-3.0.101-0.7.40.1.i586",
                "product": {
                  "name": "kernel-xen-devel-3.0.101-0.7.40.1.i586",
                  "product_id": "kernel-xen-devel-3.0.101-0.7.40.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-3.0.101-0.7.40.1.s390x",
                "product": {
                  "name": "kernel-default-3.0.101-0.7.40.1.s390x",
                  "product_id": "kernel-default-3.0.101-0.7.40.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.0.101-0.7.40.1.s390x",
                "product": {
                  "name": "kernel-default-base-3.0.101-0.7.40.1.s390x",
                  "product_id": "kernel-default-base-3.0.101-0.7.40.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.0.101-0.7.40.1.s390x",
                "product": {
                  "name": "kernel-default-devel-3.0.101-0.7.40.1.s390x",
                  "product_id": "kernel-default-devel-3.0.101-0.7.40.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-3.0.101-0.7.40.1.s390x",
                "product": {
                  "name": "kernel-default-man-3.0.101-0.7.40.1.s390x",
                  "product_id": "kernel-default-man-3.0.101-0.7.40.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-3.0.101-0.7.40.1.s390x",
                "product": {
                  "name": "kernel-source-3.0.101-0.7.40.1.s390x",
                  "product_id": "kernel-source-3.0.101-0.7.40.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.0.101-0.7.40.1.s390x",
                "product": {
                  "name": "kernel-syms-3.0.101-0.7.40.1.s390x",
                  "product_id": "kernel-syms-3.0.101-0.7.40.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-3.0.101-0.7.40.1.s390x",
                "product": {
                  "name": "kernel-trace-3.0.101-0.7.40.1.s390x",
                  "product_id": "kernel-trace-3.0.101-0.7.40.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-base-3.0.101-0.7.40.1.s390x",
                "product": {
                  "name": "kernel-trace-base-3.0.101-0.7.40.1.s390x",
                  "product_id": "kernel-trace-base-3.0.101-0.7.40.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-devel-3.0.101-0.7.40.1.s390x",
                "product": {
                  "name": "kernel-trace-devel-3.0.101-0.7.40.1.s390x",
                  "product_id": "kernel-trace-devel-3.0.101-0.7.40.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-default-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-default-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-default-base-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-default-base-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-default-devel-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-ec2-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-ec2-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-source-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-source-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-syms-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-syms-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-trace-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-trace-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-base-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-trace-base-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-trace-base-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-xen-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-xen-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-base-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-xen-base-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-xen-base-3.0.101-0.7.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64",
                "product": {
                  "name": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64",
                  "product_id": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 11 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 11 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-default-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x"
        },
        "product_reference": "kernel-default-3.0.101-0.7.40.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-default-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-default-base-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x"
        },
        "product_reference": "kernel-default-base-3.0.101-0.7.40.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-default-base-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-default-devel-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x"
        },
        "product_reference": "kernel-default-devel-3.0.101-0.7.40.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-default-devel-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x"
        },
        "product_reference": "kernel-default-man-3.0.101-0.7.40.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-ec2-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-ec2-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-ec2-base-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-ec2-devel-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-pae-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-pae-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-pae-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-pae-base-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-pae-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-pae-devel-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-source-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x"
        },
        "product_reference": "kernel-source-3.0.101-0.7.40.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-source-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-syms-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x"
        },
        "product_reference": "kernel-syms-3.0.101-0.7.40.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-syms-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-trace-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x"
        },
        "product_reference": "kernel-trace-3.0.101-0.7.40.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-trace-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-trace-base-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-base-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x"
        },
        "product_reference": "kernel-trace-base-3.0.101-0.7.40.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-base-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-trace-base-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-trace-devel-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-devel-3.0.101-0.7.40.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x"
        },
        "product_reference": "kernel-trace-devel-3.0.101-0.7.40.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-xen-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-xen-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-base-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-xen-base-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-base-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-xen-base-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-3.0.101-0.7.40.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586"
        },
        "product_reference": "kernel-xen-devel-3.0.101-0.7.40.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        },
        "product_reference": "kernel-xen-devel-3.0.101-0.7.40.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2013-2015",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-2015"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel before 3.7.3 does not properly handle orphan-list entries for non-journal filesystems, which allows physically proximate attackers to cause a denial of service (system hang) via a crafted filesystem on removable media, as demonstrated by the e2fsprogs tests/f_orphan_extents_inode/image.gz test.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-2015",
          "url": "https://www.suse.com/security/cve/CVE-2013-2015"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 817377 for CVE-2013-2015",
          "url": "https://bugzilla.suse.com/817377"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2013-2015"
    },
    {
      "cve": "CVE-2013-7446",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2013-7446"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2013-7446",
          "url": "https://www.suse.com/security/cve/CVE-2013-7446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2013-7446",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 955654 for CVE-2013-7446",
          "url": "https://bugzilla.suse.com/955654"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 955837 for CVE-2013-7446",
          "url": "https://bugzilla.suse.com/955837"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2013-7446"
    },
    {
      "cve": "CVE-2015-0272",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-0272"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-0272",
          "url": "https://www.suse.com/security/cve/CVE-2015-0272"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-0272",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 944296 for CVE-2015-0272",
          "url": "https://bugzilla.suse.com/944296"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951638 for CVE-2015-0272",
          "url": "https://bugzilla.suse.com/951638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 955354 for CVE-2015-0272",
          "url": "https://bugzilla.suse.com/955354"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-0272"
    },
    {
      "cve": "CVE-2015-3339",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-3339"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-3339",
          "url": "https://www.suse.com/security/cve/CVE-2015-3339"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 903967 for CVE-2015-3339",
          "url": "https://bugzilla.suse.com/903967"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 928130 for CVE-2015-3339",
          "url": "https://bugzilla.suse.com/928130"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 939263 for CVE-2015-3339",
          "url": "https://bugzilla.suse.com/939263"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-3339"
    },
    {
      "cve": "CVE-2015-5307",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-5307"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-5307",
          "url": "https://www.suse.com/security/cve/CVE-2015-5307"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 953527 for CVE-2015-5307",
          "url": "https://bugzilla.suse.com/953527"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 954018 for CVE-2015-5307",
          "url": "https://bugzilla.suse.com/954018"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 954404 for CVE-2015-5307",
          "url": "https://bugzilla.suse.com/954404"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 954405 for CVE-2015-5307",
          "url": "https://bugzilla.suse.com/954405"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 962977 for CVE-2015-5307",
          "url": "https://bugzilla.suse.com/962977"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-5307"
    },
    {
      "cve": "CVE-2015-6252",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-6252"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-6252",
          "url": "https://www.suse.com/security/cve/CVE-2015-6252"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 942367 for CVE-2015-6252",
          "url": "https://bugzilla.suse.com/942367"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-6252"
    },
    {
      "cve": "CVE-2015-6937",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-6937"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-6937",
          "url": "https://www.suse.com/security/cve/CVE-2015-6937"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2015-6937",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 923755 for CVE-2015-6937",
          "url": "https://bugzilla.suse.com/923755"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 945825 for CVE-2015-6937",
          "url": "https://bugzilla.suse.com/945825"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 952384 for CVE-2015-6937",
          "url": "https://bugzilla.suse.com/952384"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 953052 for CVE-2015-6937",
          "url": "https://bugzilla.suse.com/953052"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 963994 for CVE-2015-6937",
          "url": "https://bugzilla.suse.com/963994"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-6937"
    },
    {
      "cve": "CVE-2015-7509",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7509"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7509",
          "url": "https://www.suse.com/security/cve/CVE-2015-7509"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-7509",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 956707 for CVE-2015-7509",
          "url": "https://bugzilla.suse.com/956707"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 956709 for CVE-2015-7509",
          "url": "https://bugzilla.suse.com/956709"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 956766 for CVE-2015-7509",
          "url": "https://bugzilla.suse.com/956766"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-7509"
    },
    {
      "cve": "CVE-2015-7515",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7515"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel before 4.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7515",
          "url": "https://www.suse.com/security/cve/CVE-2015-7515"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-7515",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 956708 for CVE-2015-7515",
          "url": "https://bugzilla.suse.com/956708"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-7515"
    },
    {
      "cve": "CVE-2015-7550",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7550"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7550",
          "url": "https://www.suse.com/security/cve/CVE-2015-7550"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-7550",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1052256 for CVE-2015-7550",
          "url": "https://bugzilla.suse.com/1052256"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 958951 for CVE-2015-7550",
          "url": "https://bugzilla.suse.com/958951"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-7550"
    },
    {
      "cve": "CVE-2015-7566",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7566"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7566",
          "url": "https://www.suse.com/security/cve/CVE-2015-7566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-7566",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 961512 for CVE-2015-7566",
          "url": "https://bugzilla.suse.com/961512"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-7566"
    },
    {
      "cve": "CVE-2015-7799",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7799"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7799",
          "url": "https://www.suse.com/security/cve/CVE-2015-7799"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-7799",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1052256 for CVE-2015-7799",
          "url": "https://bugzilla.suse.com/1052256"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 949936 for CVE-2015-7799",
          "url": "https://bugzilla.suse.com/949936"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951638 for CVE-2015-7799",
          "url": "https://bugzilla.suse.com/951638"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-7799"
    },
    {
      "cve": "CVE-2015-7872",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7872"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7872",
          "url": "https://www.suse.com/security/cve/CVE-2015-7872"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951440 for CVE-2015-7872",
          "url": "https://bugzilla.suse.com/951440"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951542 for CVE-2015-7872",
          "url": "https://bugzilla.suse.com/951542"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951638 for CVE-2015-7872",
          "url": "https://bugzilla.suse.com/951638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 958463 for CVE-2015-7872",
          "url": "https://bugzilla.suse.com/958463"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 958601 for CVE-2015-7872",
          "url": "https://bugzilla.suse.com/958601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-7872"
    },
    {
      "cve": "CVE-2015-7990",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7990"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7990",
          "url": "https://www.suse.com/security/cve/CVE-2015-7990"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 945825 for CVE-2015-7990",
          "url": "https://bugzilla.suse.com/945825"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 952384 for CVE-2015-7990",
          "url": "https://bugzilla.suse.com/952384"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 953052 for CVE-2015-7990",
          "url": "https://bugzilla.suse.com/953052"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-7990"
    },
    {
      "cve": "CVE-2015-8104",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8104"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8104",
          "url": "https://www.suse.com/security/cve/CVE-2015-8104"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215748 for CVE-2015-8104",
          "url": "https://bugzilla.suse.com/1215748"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 953527 for CVE-2015-8104",
          "url": "https://bugzilla.suse.com/953527"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 954018 for CVE-2015-8104",
          "url": "https://bugzilla.suse.com/954018"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 954404 for CVE-2015-8104",
          "url": "https://bugzilla.suse.com/954404"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 954405 for CVE-2015-8104",
          "url": "https://bugzilla.suse.com/954405"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 962977 for CVE-2015-8104",
          "url": "https://bugzilla.suse.com/962977"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2015-8104"
    },
    {
      "cve": "CVE-2015-8215",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8215"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272.  NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8215",
          "url": "https://www.suse.com/security/cve/CVE-2015-8215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-8215",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1052256 for CVE-2015-8215",
          "url": "https://bugzilla.suse.com/1052256"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 944296 for CVE-2015-8215",
          "url": "https://bugzilla.suse.com/944296"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951638 for CVE-2015-8215",
          "url": "https://bugzilla.suse.com/951638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 955354 for CVE-2015-8215",
          "url": "https://bugzilla.suse.com/955354"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-8215"
    },
    {
      "cve": "CVE-2015-8539",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8539"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8539",
          "url": "https://www.suse.com/security/cve/CVE-2015-8539"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2015-8539",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 781018 for CVE-2015-8539",
          "url": "https://bugzilla.suse.com/781018"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 958463 for CVE-2015-8539",
          "url": "https://bugzilla.suse.com/958463"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 958601 for CVE-2015-8539",
          "url": "https://bugzilla.suse.com/958601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "important"
        }
      ],
      "title": "CVE-2015-8539"
    },
    {
      "cve": "CVE-2015-8543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8543",
          "url": "https://www.suse.com/security/cve/CVE-2015-8543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-8543",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1052256 for CVE-2015-8543",
          "url": "https://bugzilla.suse.com/1052256"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2015-8543",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 923755 for CVE-2015-8543",
          "url": "https://bugzilla.suse.com/923755"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 958886 for CVE-2015-8543",
          "url": "https://bugzilla.suse.com/958886"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 963994 for CVE-2015-8543",
          "url": "https://bugzilla.suse.com/963994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 969522 for CVE-2015-8543",
          "url": "https://bugzilla.suse.com/969522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-8543"
    },
    {
      "cve": "CVE-2015-8569",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8569"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8569",
          "url": "https://www.suse.com/security/cve/CVE-2015-8569"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-8569",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 923755 for CVE-2015-8569",
          "url": "https://bugzilla.suse.com/923755"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 959190 for CVE-2015-8569",
          "url": "https://bugzilla.suse.com/959190"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 959399 for CVE-2015-8569",
          "url": "https://bugzilla.suse.com/959399"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 963994 for CVE-2015-8569",
          "url": "https://bugzilla.suse.com/963994"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-8569"
    },
    {
      "cve": "CVE-2015-8575",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8575"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8575",
          "url": "https://www.suse.com/security/cve/CVE-2015-8575"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-8575",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 959190 for CVE-2015-8575",
          "url": "https://bugzilla.suse.com/959190"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 959399 for CVE-2015-8575",
          "url": "https://bugzilla.suse.com/959399"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-8575"
    },
    {
      "cve": "CVE-2015-8767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8767",
          "url": "https://www.suse.com/security/cve/CVE-2015-8767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-8767",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2015-8767",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 961509 for CVE-2015-8767",
          "url": "https://bugzilla.suse.com/961509"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-8767"
    },
    {
      "cve": "CVE-2015-8785",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8785"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8785",
          "url": "https://www.suse.com/security/cve/CVE-2015-8785"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-8785",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 963765 for CVE-2015-8785",
          "url": "https://bugzilla.suse.com/963765"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-8785"
    },
    {
      "cve": "CVE-2015-8812",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8812"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8812",
          "url": "https://www.suse.com/security/cve/CVE-2015-8812"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-8812",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2015-8812",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 966437 for CVE-2015-8812",
          "url": "https://bugzilla.suse.com/966437"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 966683 for CVE-2015-8812",
          "url": "https://bugzilla.suse.com/966683"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-8812"
    },
    {
      "cve": "CVE-2015-8816",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8816"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8816",
          "url": "https://www.suse.com/security/cve/CVE-2015-8816"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2015-8816",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 968010 for CVE-2015-8816",
          "url": "https://bugzilla.suse.com/968010"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 979064 for CVE-2015-8816",
          "url": "https://bugzilla.suse.com/979064"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-8816"
    },
    {
      "cve": "CVE-2016-0723",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-0723"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-0723",
          "url": "https://www.suse.com/security/cve/CVE-2016-0723"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-0723",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 961500 for CVE-2016-0723",
          "url": "https://bugzilla.suse.com/961500"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-0723"
    },
    {
      "cve": "CVE-2016-2069",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2069"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2069",
          "url": "https://www.suse.com/security/cve/CVE-2016-2069"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2069",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2016-2069",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 870618 for CVE-2016-2069",
          "url": "https://bugzilla.suse.com/870618"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 963767 for CVE-2016-2069",
          "url": "https://bugzilla.suse.com/963767"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-2069"
    },
    {
      "cve": "CVE-2016-2143",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2143"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2143",
          "url": "https://www.suse.com/security/cve/CVE-2016-2143"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2016-2143",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 970504 for CVE-2016-2143",
          "url": "https://bugzilla.suse.com/970504"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 993872 for CVE-2016-2143",
          "url": "https://bugzilla.suse.com/993872"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "important"
        }
      ],
      "title": "CVE-2016-2143"
    },
    {
      "cve": "CVE-2016-2184",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2184"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2184",
          "url": "https://www.suse.com/security/cve/CVE-2016-2184"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2184",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 971125 for CVE-2016-2184",
          "url": "https://bugzilla.suse.com/971125"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-2184"
    },
    {
      "cve": "CVE-2016-2185",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2185"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2185",
          "url": "https://www.suse.com/security/cve/CVE-2016-2185"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2185",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 971124 for CVE-2016-2185",
          "url": "https://bugzilla.suse.com/971124"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-2185"
    },
    {
      "cve": "CVE-2016-2186",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2186"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2186",
          "url": "https://www.suse.com/security/cve/CVE-2016-2186"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2186",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 970958 for CVE-2016-2186",
          "url": "https://bugzilla.suse.com/970958"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2186"
    },
    {
      "cve": "CVE-2016-2188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2188",
          "url": "https://www.suse.com/security/cve/CVE-2016-2188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2188",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1067912 for CVE-2016-2188",
          "url": "https://bugzilla.suse.com/1067912"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132190 for CVE-2016-2188",
          "url": "https://bugzilla.suse.com/1132190"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 970956 for CVE-2016-2188",
          "url": "https://bugzilla.suse.com/970956"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2188"
    },
    {
      "cve": "CVE-2016-2384",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2384"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2384",
          "url": "https://www.suse.com/security/cve/CVE-2016-2384"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2384",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 966693 for CVE-2016-2384",
          "url": "https://bugzilla.suse.com/966693"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 967773 for CVE-2016-2384",
          "url": "https://bugzilla.suse.com/967773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2384"
    },
    {
      "cve": "CVE-2016-2543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel before 4.4.1 does not verify FIFO assignment before proceeding with FIFO clearing, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2543",
          "url": "https://www.suse.com/security/cve/CVE-2016-2543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2543",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 967972 for CVE-2016-2543",
          "url": "https://bugzilla.suse.com/967972"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2543"
    },
    {
      "cve": "CVE-2016-2544",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2544"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel before 4.4.1 allows local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2544",
          "url": "https://www.suse.com/security/cve/CVE-2016-2544"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2544",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 967973 for CVE-2016-2544",
          "url": "https://bugzilla.suse.com/967973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2544"
    },
    {
      "cve": "CVE-2016-2545",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2545"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel before 4.4.1 does not properly maintain a certain linked list, which allows local users to cause a denial of service (race condition and system crash) via a crafted ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2545",
          "url": "https://www.suse.com/security/cve/CVE-2016-2545"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2545",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 967974 for CVE-2016-2545",
          "url": "https://bugzilla.suse.com/967974"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-2545"
    },
    {
      "cve": "CVE-2016-2546",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2546"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "sound/core/timer.c in the Linux kernel before 4.4.1 uses an incorrect type of mutex, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2546",
          "url": "https://www.suse.com/security/cve/CVE-2016-2546"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2546",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 967975 for CVE-2016-2546",
          "url": "https://bugzilla.suse.com/967975"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2546"
    },
    {
      "cve": "CVE-2016-2547",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2547"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "sound/core/timer.c in the Linux kernel before 4.4.1 employs a locking approach that does not consider slave timer instances, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2547",
          "url": "https://www.suse.com/security/cve/CVE-2016-2547"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2547",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 968011 for CVE-2016-2547",
          "url": "https://bugzilla.suse.com/968011"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2547"
    },
    {
      "cve": "CVE-2016-2548",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2548"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2548",
          "url": "https://www.suse.com/security/cve/CVE-2016-2548"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2548",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 968012 for CVE-2016-2548",
          "url": "https://bugzilla.suse.com/968012"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2548"
    },
    {
      "cve": "CVE-2016-2549",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2549"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "sound/core/hrtimer.c in the Linux kernel before 4.4.1 does not prevent recursive callback access, which allows local users to cause a denial of service (deadlock) via a crafted ioctl call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2549",
          "url": "https://www.suse.com/security/cve/CVE-2016-2549"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2549",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 968013 for CVE-2016-2549",
          "url": "https://bugzilla.suse.com/968013"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2549"
    },
    {
      "cve": "CVE-2016-2782",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2782"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2782",
          "url": "https://www.suse.com/security/cve/CVE-2016-2782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2782",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 961512 for CVE-2016-2782",
          "url": "https://bugzilla.suse.com/961512"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 968670 for CVE-2016-2782",
          "url": "https://bugzilla.suse.com/968670"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2782"
    },
    {
      "cve": "CVE-2016-2847",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2847"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2847",
          "url": "https://www.suse.com/security/cve/CVE-2016-2847"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-2847",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 970948 for CVE-2016-2847",
          "url": "https://bugzilla.suse.com/970948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 974646 for CVE-2016-2847",
          "url": "https://bugzilla.suse.com/974646"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2847"
    },
    {
      "cve": "CVE-2016-3134",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3134"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3134",
          "url": "https://www.suse.com/security/cve/CVE-2016-3134"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-3134",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1052256 for CVE-2016-3134",
          "url": "https://bugzilla.suse.com/1052256"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2016-3134",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 971126 for CVE-2016-3134",
          "url": "https://bugzilla.suse.com/971126"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 971793 for CVE-2016-3134",
          "url": "https://bugzilla.suse.com/971793"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 986362 for CVE-2016-3134",
          "url": "https://bugzilla.suse.com/986362"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 986365 for CVE-2016-3134",
          "url": "https://bugzilla.suse.com/986365"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 986377 for CVE-2016-3134",
          "url": "https://bugzilla.suse.com/986377"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-3134"
    },
    {
      "cve": "CVE-2016-3137",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3137"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3137",
          "url": "https://www.suse.com/security/cve/CVE-2016-3137"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-3137",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 970970 for CVE-2016-3137",
          "url": "https://bugzilla.suse.com/970970"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-3137"
    },
    {
      "cve": "CVE-2016-3138",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3138"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3138",
          "url": "https://www.suse.com/security/cve/CVE-2016-3138"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-3138",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 970911 for CVE-2016-3138",
          "url": "https://bugzilla.suse.com/970911"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 970970 for CVE-2016-3138",
          "url": "https://bugzilla.suse.com/970970"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-3138"
    },
    {
      "cve": "CVE-2016-3139",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3139"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel before 3.17 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3139",
          "url": "https://www.suse.com/security/cve/CVE-2016-3139"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-3139",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 970909 for CVE-2016-3139",
          "url": "https://bugzilla.suse.com/970909"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-3139"
    },
    {
      "cve": "CVE-2016-3140",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3140"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3140",
          "url": "https://www.suse.com/security/cve/CVE-2016-3140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-3140",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 970892 for CVE-2016-3140",
          "url": "https://bugzilla.suse.com/970892"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-3140"
    },
    {
      "cve": "CVE-2016-3156",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3156"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3156",
          "url": "https://www.suse.com/security/cve/CVE-2016-3156"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-3156",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 971360 for CVE-2016-3156",
          "url": "https://bugzilla.suse.com/971360"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-3156"
    },
    {
      "cve": "CVE-2016-4486",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-4486"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-4486",
          "url": "https://www.suse.com/security/cve/CVE-2016-4486"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1020452 for CVE-2016-4486",
          "url": "https://bugzilla.suse.com/1020452"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 978822 for CVE-2016-4486",
          "url": "https://bugzilla.suse.com/978822"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.40.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-08-15T10:48:57Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-4486"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…