SUSE-SU-2017:2286-1
Vulnerability from csaf_suse - Published: 2017-08-29 11:15 - Updated: 2017-08-29 11:15Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch:
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.82 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-1000111: Fixed a race condition in net-packet code that could be exploited to cause out-of-bounds memory access (bsc#1052365).
- CVE-2017-1000112: Fixed a race condition in net-packet code that could have been exploited by unprivileged users to gain root access. (bsc#1052311).
- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability (bnc#1037994).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bnc#1049882).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-7533: Race condition in the fsnotify implementation in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions (bnc#1049483 bnc#1050677).
- CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet (bnc#1049645).
- CVE-2017-10810: Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering object-initialization failures (bnc#1047277).
The following non-security bugs were fixed:
- acpi/nfit: Add support of NVDIMM memory error notification in ACPI 6.2 (bsc#1052325).
- acpi/nfit: Issue Start ARS to retrieve existing records (bsc#1052325).
- acpi / processor: Avoid reserving IO regions too early (bsc#1051478).
- acpi / scan: Prefer devices without _HID for _ADR matching (git-fixes).
- Add 'shutdown' to 'struct class' (bsc#1053117).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- alsa: fm801: Initialize chip after IRQ handler is registered (bsc#1031717).
- alsa: hda - add more ML register definitions (bsc#1048356).
- alsa: hda - add sanity check to force the separate stream tags (bsc#1048356).
- alsa: hda: Add support for parsing new HDA capabilities (bsc#1048356).
- alsa: hdac: Add support for hda DMA Resume capability (bsc#1048356).
- alsa: hdac_regmap - fix the register access for runtime PM (bsc#1048356).
- alsa: hda: Fix cpu lockup when stopping the cmd dmas (bsc#1048356).
- alsa: hda - Fix endless loop of codec configure (bsc#1031717).
- alsa: hda: fix to wait for RIRB & CORB DMA to set (bsc#1048356).
- alsa: hda - Loop interrupt handling until really cleared (bsc#1048356).
- alsa: hda - move bus_parse_capabilities to core (bsc#1048356).
- alsa: hda - set input_path bitmap to zero after moving it to new place (bsc#1031717).
- alsa: hda - set intel audio clock to a proper value (bsc#1048356).
- arm64: kernel: restrict /dev/mem read() calls to linear region (bsc#1046651).
- arm64: mm: remove page_mapping check in __sync_icache_dcache (bsc#1040347).
- arm64: Update config files. Disable DEVKMEM
- b43: Add missing MODULE_FIRMWARE() (bsc#1037344).
- bcache: force trigger gc (bsc#1038078).
- bcache: only recovery I/O error for writethrough mode (bsc#1043652).
- bcache: only recovery I/O error for writethrough mode (bsc#1043652).
- bdi: Fix use-after-free in wb_congested_put() (bsc#1040307).
- blacklist.conf: 9eeacd3a2f17 not a bug fix (bnc#1050061)
- blacklist.conf: add inapplicable commits for wifi (bsc#1031717)
- blacklist.conf: add non-applicable fixes for iwlwifi (FATE#323335)
- blacklist.conf: add unapplicable/cosmetic iwlwifi fixes (bsc#1031717).
- blacklist.conf: add unapplicable drm fixes (bsc#1031717).
- blacklist.conf: Blacklist aa2369f11ff7 ('mm/gup.c: fix access_ok() argument type') (bsc#1051478) Fixes only a compile-warning.
- blacklist.conf: Blacklist c133c7615751 ('x86/nmi: Fix timeout test in test_nmi_ipi()') It only fixes a self-test (bsc#1051478).
- blacklist.conf: Blacklist c9525a3fab63 ('x86/watchdog: Fix Kconfig help text file path reference to lockup watchdog documentation') Updates only kconfig help-text (bsc#1051478).
- blkfront: add uevent for size change (bnc#1036632).
- blk-mq: map all HWQ also in hyperthreaded system (bsc#1045866).
- block: add kblock_mod_delayed_work_on() (bsc#1050211).
- block: Allow bdi re-registration (bsc#1040307).
- block: do not allow updates through sysfs until registration completes (bsc#1047027).
- block: Fix front merge check (bsc#1051239).
- block: Make blk_mq_delay_kick_requeue_list() rerun the queue at a quiet time (bsc#1050211).
- block: Make del_gendisk() safer for disks without queues (bsc#1040307).
- block: Move bdi_unregister() to del_gendisk() (bsc#1040307).
- block: provide bio_uninit() free freeing integrity/task associations (bsc#1050211).
- bluetooth: hidp: fix possible might sleep error in hidp_session_thread (bsc#1031784).
- brcmfmac: Fix glom_skb leak in brcmf_sdiod_recv_chain (bsc#1031717).
- btrfs: add cond_resched to btrfs_qgroup_trace_leaf_items (bsc#1028286).
- btrfs: Add WARN_ON for qgroup reserved underflow (bsc#1031515).
- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- btrfs: fix lockup in find_free_extent with read-only block groups (bsc#1046682).
- btrfs: incremental send, fix invalid path for link commands (bsc#1051479).
- btrfs: incremental send, fix invalid path for unlink commands (bsc#1051479).
- btrfs: Manually implement device_total_bytes getter/setter (bsc#1043912).
- btrfs: resume qgroup rescan on rw remount (bsc#1047152).
- btrfs: Round down values which are written for total_bytes_size (bsc#1043912).
- btrfs: send, fix invalid path after renaming and linking file (bsc#1051479).
- cifs: Fix some return values in case of error in 'crypt_message' (bnc#1047802).
- clocksource/drivers/arm_arch_timer: Fix read and iounmap of incorrect variable (bsc#1045937).
- cpuidle: dt: Add missing 'of_node_put()' (bnc#1022476).
- crypto: s5p-sss - fix incorrect usage of scatterlists api (bsc#1048317).
- cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc# 1045154).
- cxgb4: fix a NULL dereference (bsc#1005778).
- cxgb4: fix BUG() on interrupt deallocating path of ULD (bsc#1005778).
- cxgb4: fix memory leak in init_one() (bsc#1005778).
- cxl: Unlock on error in probe (bsc#1034762, Pending SUSE Kernel Fixes).
- dentry name snapshots (bsc#1049483).
- device-dax: fix sysfs attribute deadlock (bsc#1048919).
- dm: fix second blk_delay_queue() parameter to be in msec units not (bsc#1047670).
- dm: make flush bios explicitly sync (bsc#1050211).
- dm raid1: fixes two crash cases if mirror leg failed (bsc#1043520)
- drivers/char: kmem: disable on arm64 (bsc#1046655).
- drivers: hv: As a bandaid, increase HV_UTIL_TIMEOUT from 30 to 60 seconds (bnc#1039153)
- drivers: hv: Fix a typo (fate#320485).
- drivers: hv: Fix the bug in generating the guest ID (fate#320485).
- drivers: hv: util: Fix a typo (fate#320485).
- drivers: hv: util: Make hv_poll_channel() a little more efficient (fate#320485).
- drivers: hv: vmbus: Close timing hole that can corrupt per-cpu page (fate#320485).
- drivers: hv: vmbus: Fix error code returned by vmbus_post_msg() (fate#320485).
- drivers: hv: vmbus: Get the current time from the current clocksource (fate#320485, bnc#1044112).
- drivers: hv: vmbus: Get the current time from the current clocksource (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- drivers: hv: vmbus: Increase the time between retries in vmbus_post_msg() (fate#320485, bnc#1044112).
- drivers: hv: vmbus: Increase the time between retries in vmbus_post_msg() (fate#320485, bnc#1044112).
- drivers: hv: vmbus: Move the code to signal end of message (fate#320485).
- drivers: hv: vmbus: Move the definition of generate_guest_id() (fate#320485).
- drivers: hv: vmbus: Move the definition of hv_x64_msr_hypercall_contents (fate#320485).
- drivers: hv: vmbus: Restructure the clockevents code (fate#320485).
- drm/amdgpu: Fix overflow of watermark calcs at > 4k resolutions (bsc#1031717).
- drm/bochs: Implement nomodeset (bsc#1047096).
- drm/i915/fbdev: Stop repeating tile configuration on stagnation (bsc#1031717).
- drm/i915: Fix scaler init during CRTC HW state readout (bsc#1031717).
- drm/i915: Serialize GTT/Aperture accesses on BXT (bsc#1046821).
- drm/virtio: do not leak bo on drm_gem_object_init failure (bsc#1047277).
- drm/vmwgfx: Fix large topology crash (bsc#1048155).
- drm/vmwgfx: Support topology greater than texture size (bsc#1048155).
- Drop patches; obsoleted by 'scsi: Add STARGET_CREATE_REMOVE state'
- efi/libstub: Skip GOP with PIXEL_BLT_ONLY format (bnc#974215).
- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: avoid unnecessary stalls in ext4_evict_inode() (bsc#1049486).
- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: handle the rest of ext4_mb_load_buddy() ENOMEM errors (bsc#1012829).
- Fix kABI breakage by HD-audio bus caps extensions (bsc#1048356).
- Fix kABI breakage by KVM CVE fix (bsc#1045922).
- fs/fcntl: f_setown, avoid undefined behaviour (bnc#1006180).
- fs: pass on flags in compat_writev (bsc#1050211).
- fuse: initialize the flock flag in fuse_file on allocation (git-fixes).
- gcov: add support for gcc version >= 6 (bsc#1051663).
- gcov: support GCC 7.1 (bsc#1051663).
- gfs2: fix flock panic issue (bsc#1012829).
- hpsa: limit transfer length to 1MB (bsc#1025461).
- hrtimer: Catch invalid clockids again (bsc#1047651).
- hrtimer: Revert CLOCK_MONOTONIC_RAW support (bsc#1047651).
- hv_netvsc: change netvsc device default duplex to FULL (fate#320485).
- hv_netvsc: Exclude non-TCP port numbers from vRSS hashing (bsc#1048421).
- hv_netvsc: Fix the carrier state error when data path is off (fate#320485).
- hv_netvsc: Fix the queue index computation in forwarding case (bsc#1048421).
- hv_netvsc: Remove unnecessary var link_state from struct netvsc_device_info (fate#320485).
- hv: print extra debug in kvp_on_msg in error paths (bnc#1039153).
- hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485, bnc#1044112).
- hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485, bnc#1044112).
- hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- hv_util: switch to using timespec64 (fate#320485).
- hwpoison, memcg: forcibly uncharge LRU pages (bnc#1046105).
- hyperv: fix warning about missing prototype (fate#320485).
- hyperv: netvsc: Neaten netvsc_send_pkt by using a temporary (fate#320485).
- hyperv: remove unnecessary return variable (fate#320485).
- i2c: designware-baytrail: fix potential null pointer dereference on dev (bsc#1011913).
- i40e: add hw struct local variable (bsc#1039915).
- i40e: add private flag to control source pruning (bsc#1034075).
- i40e: add VSI info to macaddr messages (bsc#1039915).
- i40e: avoid looping to check whether we're in VLAN mode (bsc#1039915).
- i40e: avoid O(n^2) loop when deleting all filters (bsc#1039915).
- i40e: delete filter after adding its replacement when converting (bsc#1039915).
- i40e: do not add broadcast filter for VFs (bsc#1039915).
- i40e: do not allow i40e_vsi_(add|kill)_vlan to operate when VID<1 (bsc#1039915).
- i40e: drop is_vf and is_netdev fields in struct i40e_mac_filter (bsc#1039915).
- i40e: enable VSI broadcast promiscuous mode instead of adding broadcast filter (bsc#1039915).
- i40e: factor out addition/deletion of VLAN per each MAC address (bsc#1039915).
- i40e: fix ethtool to get EEPROM data from X722 interface (bsc#1047418).
- i40e: fix MAC filters when removing VLANs (bsc#1039915).
- i40e: fold the i40e_is_vsi_in_vlan check into i40e_put_mac_in_vlan (bsc#1039915).
- i40e/i40evf: Fix use after free in Rx cleanup path (bsc#1051689).
- i40e: implement __i40e_del_filter and use where applicable (bsc#1039915).
- i40e: make use of __dev_uc_sync and __dev_mc_sync (bsc#1039915).
- i40e: move all updates for VLAN mode into i40e_sync_vsi_filters (bsc#1039915).
- i40e: move i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).
- i40e: no need to check is_vsi_in_vlan before calling i40e_del_mac_all_vlan (bsc#1039915).
- i40e: properly cleanup on allocation failure in i40e_sync_vsi_filters (bsc#1039915).
- i40e: recalculate vsi->active_filters from hash contents (bsc#1039915).
- i40e: refactor i40e_put_mac_in_vlan to avoid changing f->vlan (bsc#1039915).
- i40e: refactor i40e_update_filter_state to avoid passing aq_err (bsc#1039915).
- i40e: refactor Rx filter handling (bsc#1039915).
- i40e: Removal of workaround for simple MAC address filter deletion (bsc#1039915).
- i40e: remove code to handle dev_addr specially (bsc#1039915).
- i40e: removed unreachable code (bsc#1039915).
- i40e: remove duplicate add/delete adminq command code for filters (bsc#1039915).
- i40e: remove second check of VLAN_N_VID in i40e_vlan_rx_add_vid (bsc#1039915).
- i40e: rename i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).
- i40e: restore workaround for removing default MAC filter (bsc#1039915).
- i40e: set broadcast promiscuous mode for each active VLAN (bsc#1039915).
- i40e: store MAC/VLAN filters in a hash with the MAC Address as key (bsc#1039915).
- i40e: use (add|rm)_vlan_all_mac helper functions when changing PVID (bsc#1039915).
- i40evf: fix merge error in older patch (bsc#1024346 FATE#321239 bsc#1024373 FATE#321247).
- i40e: when adding or removing MAC filters, correctly handle VLANs (bsc#1039915).
- i40e: When searching all MAC/VLAN filters, ignore removed filters (bsc#1039915).
- i40e: write HENA for VFs (bsc#1039915).
- IB/hfi1: Wait for QSFP modules to initialize (bsc#1019151).
- IB/iser: Fix connection teardown race condition (bsc#1050211).
- ibmvnic: Check for transport event on driver resume (bsc#1051556, bsc#1052709).
- ibmvnic: Initialize SCRQ's during login renegotiation (bsc#1052223).
- ibmvnic: Report rx buffer return codes as netdev_dbg (bsc#1052794).
- IB/rxe: Fix kernel panic from skb destructor (bsc#1049361).
- iio: hid-sensor: fix return of -EINVAL on invalid values in ret or value (bsc#1031717).
- include/linux/mmzone.h: simplify zone_intersects() (bnc#1047506).
- input: gpio-keys - fix check for disabling unsupported keys (bsc#1031717).
- introduce the walk_process_tree() helper (bnc#1022476).
- iommu/amd: Add flush counters to struct dma_ops_domain (bsc#1045709).
- iommu/amd: Add locking to per-domain flush-queue (bsc#1045709).
- iommu/amd: Add new init-state IOMMU_CMDLINE_DISABLED (bsc#1045715).
- iommu/amd: Add per-domain flush-queue data structures (bsc#1045709).
- iommu/amd: Add per-domain timer to flush per-cpu queues (bsc#1045709).
- iommu/amd: Check for error states first in iommu_go_to_state() (bsc#1045715).
- iommu/amd: Constify irq_domain_ops (bsc#1045709).
- iommu/amd: Disable IOMMUs at boot if they are enabled (bsc#1045715).
- iommu/amd: Enable ga_log_intr when enabling guest_mode (bsc1052533).
- iommu/amd: Fix interrupt remapping when disable guest_mode (bsc#1051471).
- iommu/amd: Fix schedule-while-atomic BUG in initialization code (bsc1052533).
- iommu/amd: Free already flushed ring-buffer entries before full-check (bsc#1045709).
- iommu/amd: Free IOMMU resources when disabled on command line (bsc#1045715).
- iommu/amd: Make use of the per-domain flush queue (bsc#1045709).
- iommu/amd: Ratelimit io-page-faults per device (bsc#1045709).
- iommu/amd: Reduce amount of MMIO when submitting commands (bsc#1045709).
- iommu/amd: Reduce delay waiting for command buffer space (bsc#1045709).
- iommu/amd: Remove amd_iommu_disabled check from amd_iommu_detect() (bsc#1045715).
- iommu/amd: Remove queue_release() function (bsc#1045709).
- iommu/amd: Rename free_on_init_error() (bsc#1045715).
- iommu/amd: Rip out old queue flushing code (bsc#1045709).
- iommu/amd: Set global pointers to NULL after freeing them (bsc#1045715).
- iommu/amd: Suppress IO_PAGE_FAULTs in kdump kernel (bsc#1045715 bsc#1043261).
- iommu: Remove a patch because it caused problems for users. See bsc#1048348.
- ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output (bsc#1041958).
- ipv6: Should use consistent conditional judgement for ip6 fragment between __ip6_append_data and ip6_finish_output (bsc#1041958).
- iw_cxgb4: Fix error return code in c4iw_rdev_open() (bsc#1026570).
- iwlwifi: 8000: fix MODULE_FIRMWARE input (FATE#321353, FATE#323335).
- iwlwifi: 9000: increase the number of queues (FATE#321353, FATE#323335).
- iwlwifi: add device ID for 8265 (FATE#321353, FATE#323335).
- iwlwifi: add device IDs for the 8265 device (FATE#321353, FATE#323335).
- iwlwifi: add disable_11ac module param (FATE#321353, FATE#323335).
- iwlwifi: add new 3168 series devices support (FATE#321353, FATE#323335).
- iwlwifi: add new 8260 PCI IDs (FATE#321353, FATE#323335).
- iwlwifi: add new 8265 (FATE#321353, FATE#323335).
- iwlwifi: add new 8265 series PCI ID (FATE#321353, FATE#323335).
- iwlwifi: Add new PCI IDs for 9260 and 5165 series (FATE#321353, FATE#323335).
- iwlwifi: Add PCI IDs for the new 3168 series (FATE#321353, FATE#323335).
- iwlwifi: Add PCI IDs for the new series 8165 (FATE#321353, FATE#323335).
- iwlwifi: add support for 12K Receive Buffers (FATE#321353, FATE#323335).
- iwlwifi: add support for getting HW address from CSR (FATE#321353, FATE#323335).
- iwlwifi: avoid d0i3 commands when no/init ucode is loaded (FATE#321353, FATE#323335).
- iwlwifi: bail out in case of bad trans state (FATE#321353, FATE#323335).
- iwlwifi: block the queues when we send ADD_STA for uAPSD (FATE#321353, FATE#323335).
- iwlwifi: change the Intel Wireless email address (FATE#321353, FATE#323335).
- iwlwifi: change the Intel Wireless email address (FATE#321353, FATE#323335).
- iwlwifi: check for valid ethernet address provided by OEM (FATE#321353, FATE#323335).
- iwlwifi: clean up transport debugfs handling (FATE#321353, FATE#323335).
- iwlwifi: clear ieee80211_tx_info->driver_data in the op_mode (FATE#321353, FATE#323335).
- iwlwifi: Document missing module options (FATE#321353, FATE#323335).
- iwlwifi: dump prph registers in a common place for all transports (FATE#321353, FATE#323335).
- iwlwifi: dvm: advertise NETIF_F_SG (FATE#321353, FATE#323335).
- iwlwifi: dvm: fix compare_const_fl.cocci warnings (FATE#321353, FATE#323335).
- iwlwifi: dvm: handle zero brightness for wifi LED (FATE#321353, FATE#323335).
- iwlwifi: dvm: remove a wrong dependency on m (FATE#321353, FATE#323335).
- iwlwifi: dvm: remove Kconfig default (FATE#321353, FATE#323335).
- iwlwifi: dvm: remove stray debug code (FATE#321353, FATE#323335).
- iwlwifi: export the _no_grab version of PRPH IO functions (FATE#321353, FATE#323335).
- iwlwifi: expose fw usniffer mode to more utilities (FATE#321353, FATE#323335).
- iwlwifi: fix double hyphen in MODULE_FIRMWARE for 8000 (FATE#321353, FATE#323335).
- iwlwifi: Fix firmware name maximum length definition (FATE#321353, FATE#323335).
- iwlwifi: fix name of ucode loaded for 8265 series (FATE#321353, FATE#323335).
- iwlwifi: fix printf specifier (FATE#321353, FATE#323335).
- iwlwifi: generalize d0i3_entry_timeout module parameter (FATE#321353, FATE#323335).
- iwlwifi: missing error code in iwl_trans_pcie_alloc() (bsc#1031717).
- iwlwifi: mvm: adapt the firmware assert log to new firmware (FATE#321353, FATE#323335).
- iwlwifi: mvm: add 9000-series RX API (FATE#321353, FATE#323335).
- iwlwifi: mvm: add 9000 series RX processing (FATE#321353, FATE#323335).
- iwlwifi: mvm: add a non-trigger window to fw dbg triggers (FATE#321353, FATE#323335).
- iwlwifi: mvm: add an option to start rs from HT/VHT rates (FATE#321353, FATE#323335).
- iwlwifi: mvm: Add a station in monitor mode (FATE#321353, FATE#323335).
- iwlwifi: mvm: add bt rrc and ttc to debugfs (FATE#321353, FATE#323335).
- iwlwifi: mvm: add bt settings to debugfs (FATE#321353, FATE#323335).
- iwlwifi: mvm: add ctdp operations to debugfs (FATE#321353, FATE#323335).
- iwlwifi: mvm: add CT-KILL notification (FATE#321353, FATE#323335).
- iwlwifi: mvm: add debug print if scan config is ignored (FATE#321353, FATE#323335).
- iwlwifi: mvm: add extended dwell time (FATE#321353, FATE#323335).
- iwlwifi: mvm: add new ADD_STA command version (FATE#321353, FATE#323335).
- iwlwifi: mvm: Add P2P client snoozing (FATE#321353, FATE#323335).
- iwlwifi: mvm: add registration to cooling device (FATE#321353, FATE#323335).
- iwlwifi: mvm: add registration to thermal zone (FATE#321353, FATE#323335).
- iwlwifi: mvm: add support for negative temperatures (FATE#321353, FATE#323335).
- iwlwifi: mvm: add tlv for multi queue rx support (FATE#321353, FATE#323335).
- iwlwifi: mvm: add trigger for firmware dump upon TDLS events (FATE#321353, FATE#323335).
- iwlwifi: mvm: add trigger for firmware dump upon TX response status (FATE#321353, FATE#323335).
- iwlwifi: mvm: advertise NETIF_F_SG (FATE#321353, FATE#323335).
- iwlwifi: mvm: Align bt-coex priority with requirements (FATE#321353, FATE#323335).
- iwlwifi: mvm: allow to disable beacon filtering for AP/GO interface (FATE#321353, FATE#323335).
- iwlwifi: mvm: avoid harmless -Wmaybe-uninialized warning (FATE#321353, FATE#323335).
- iwlwifi: mvm: avoid panics with thermal device usage (FATE#321353, FATE#323335).
- iwlwifi: mvm: avoid to WARN about gscan capabilities (FATE#321353, FATE#323335).
- iwlwifi: mvm: bail out if CTDP start operation fails (FATE#321353, FATE#323335).
- iwlwifi: mvm: bump firmware API to 21 (FATE#321353, FATE#323335).
- iwlwifi: mvm: bump max API to 20 (FATE#321353, FATE#323335).
- iwlwifi: mvm: change access to ieee80211_hdr (FATE#321353, FATE#323335).
- iwlwifi: mvm: change iwl_mvm_get_key_sta_id() to return the station (FATE#321353, FATE#323335).
- iwlwifi: mvm: change mcc update API (FATE#321353, FATE#323335).
- iwlwifi: mvm: change name of iwl_mvm_d3_update_gtk (FATE#321353, FATE#323335).
- iwlwifi: mvm: Change number of associated stations when station becomes associated (FATE#321353, FATE#323335).
- iwlwifi: mvm: change protocol offload flows (FATE#321353, FATE#323335).
- iwlwifi: mvm: change the check for ADD_STA status (FATE#321353, FATE#323335).
- iwlwifi: mvm: check FW's response for nvm access write cmd (FATE#321353, FATE#323335).
- iwlwifi: mvm: check iwl_mvm_wowlan_config_key_params() return value (FATE#321353, FATE#323335).
- iwlwifi: mvm: check minimum temperature notification length (FATE#321353, FATE#323335).
- iwlwifi: mvm: cleanup roc te on restart cleanup (FATE#321353, FATE#323335).
- iwlwifi: mvm: compare full command ID (FATE#321353, FATE#323335).
- iwlwifi: mvm: Configure fragmented scan for scheduled scan (FATE#321353, FATE#323335).
- iwlwifi: mvm: configure scheduled scan according to traffic conditions (FATE#321353, FATE#323335).
- iwlwifi: mvm: constify the parameters of a few functions in fw-dbg.c (FATE#321353, FATE#323335).
- iwlwifi: mvm: Disable beacon storing in D3 when WOWLAN configured (FATE#321353, FATE#323335).
- iwlwifi: mvm: disable DQA support (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not ask beacons when P2P GO vif and no assoc sta (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not keep an mvm ref when the interface is down (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not let NDPs mess the packet tracking (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not restart HW if suspend fails with unified image (FATE#321353, FATE#323335).
- iwlwifi: mvm: Do not switch to D3 image on suspend (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not try to offload AES-CMAC in AP/IBSS modes (FATE#321353, FATE#323335).
- iwlwifi: mvm: drop low_latency_agg_frame_cnt_limit (FATE#321353, FATE#323335).
- iwlwifi: mvm: dump more registers upon error (FATE#321353, FATE#323335).
- iwlwifi: mvm: dump the radio registers when the firmware crashes (FATE#321353, FATE#323335).
- iwlwifi: mvm: enable L3 filtering (FATE#321353, FATE#323335).
- iwlwifi: mvm: Enable MPLUT only on supported hw (FATE#321353, FATE#323335).
- iwlwifi: mvm: enable VHT MU-MIMO for supported hardware (FATE#321353, FATE#323335).
- iwlwifi: mvm: extend time event duration (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix accessing Null pointer during fw dump collection (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix d3_test with unified D0/D3 images (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix debugfs signedness warning (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix extended dwell time (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix incorrect fallthrough in iwl_mvm_check_running_scans() (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix memory leaks in error paths upon fw error dump (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix netdetect starting/stopping for unified images (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix RSS key sizing (FATE#321353, FATE#323335).
- iwlwifi: mvm: fix unregistration of thermal in some error flows (FATE#321353, FATE#323335).
- iwlwifi: mvm: flush all used TX queues before suspending (FATE#321353, FATE#323335).
- iwlwifi: mvm: forbid U-APSD for P2P Client if the firmware does not support it (FATE#321353, FATE#323335).
- iwlwifi: mvm: handle pass all scan reporting (FATE#321353, FATE#323335).
- iwlwifi: mvm: ignore LMAC scan notifications when running UMAC scans (FATE#321353, FATE#323335).
- iwlwifi: mvm: infrastructure for frame-release message (FATE#321353, FATE#323335).
- iwlwifi: mvm: kill iwl_mvm_enable_agg_txq (FATE#321353, FATE#323335).
- iwlwifi: mvm: let the firmware choose the antenna for beacons (FATE#321353, FATE#323335).
- iwlwifi: mvm: make collecting fw debug data optional (FATE#321353, FATE#323335).
- iwlwifi: mvm: move fw-dbg code to separate file (FATE#321353, FATE#323335).
- iwlwifi: mvm: only release the trans ref if d0i3 is supported in fw (FATE#321353, FATE#323335).
- iwlwifi: mvm: prepare the code towards TSO implementation (FATE#321353, FATE#323335).
- iwlwifi: mvm: refactor d3 key update functions (FATE#321353, FATE#323335).
- iwlwifi: mvm: refactor the way fw_key_table is handled (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove an extra tab (FATE#321353, FATE#323335).
- iwlwifi: mvm: Remove bf_vif from iwl_power_vifs (FATE#321353, FATE#323335).
- iwlwifi: mvm: Remove iwl_mvm_update_beacon_abort (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove redundant d0i3 flag from the config struct (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove shadowing variable (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove stray nd_config element (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove the vif parameter of iwl_mvm_configure_bcast_filter() (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove unnecessary check in iwl_mvm_is_d0i3_supported() (FATE#321353, FATE#323335).
- iwlwifi: mvm: remove useless WARN_ON and rely on cfg80211's combination (FATE#321353, FATE#323335).
- iwlwifi: mvm: report wakeup for wowlan (FATE#321353, FATE#323335).
- iwlwifi: mvm: reset mvm->scan_type when firmware is started (FATE#321353, FATE#323335).
- iwlwifi: mvm: reset the fw_dump_desc pointer after ASSERT (bsc#1031717).
- iwlwifi: mvm: return the cooling state index instead of the budget (FATE#321353, FATE#323335).
- iwlwifi: mvm: ROC: cleanup time event info on FW failure (FATE#321353, FATE#323335).
- iwlwifi: mvm: ROC: Extend the ROC max delay duration & limit ROC duration (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix a potential out of bounds access (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix a theoretical access to uninitialized array elements (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix a warning message (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix TPC action decision algorithm (FATE#321353, FATE#323335).
- iwlwifi: mvm: rs: fix TPC statistics handling (FATE#321353, FATE#323335).
- iwlwifi: mvm: Send power command on BSS_CHANGED_BEACON_INFO if needed (FATE#321353, FATE#323335).
- iwlwifi: mvm: set default new STA as non-aggregated (FATE#321353, FATE#323335).
- iwlwifi: mvm: set the correct amsdu enum values (FATE#321353, FATE#323335).
- iwlwifi: mvm: set the correct descriptor size for tracing (FATE#321353, FATE#323335).
- iwlwifi: mvm: small update in the firmware API (FATE#321353, FATE#323335).
- iwlwifi: mvm: support A-MSDU in A-MPDU (FATE#321353, FATE#323335).
- iwlwifi: mvm: support beacon storing (FATE#321353, FATE#323335).
- iwlwifi: mvm: support description for user triggered fw dbg collection (FATE#321353, FATE#323335).
- iwlwifi: mvm: support rss queues configuration command (FATE#321353, FATE#323335).
- iwlwifi: mvm: Support setting continuous recording debug mode (FATE#321353, FATE#323335).
- iwlwifi: mvm: support setting minimum quota from debugfs (FATE#321353, FATE#323335).
- iwlwifi: mvm: support sw queue start/stop from mvm (FATE#321353, FATE#323335).
- iwlwifi: mvm: synchronize firmware DMA paging memory (FATE#321353, FATE#323335).
- iwlwifi: mvm: take care of padded packets (FATE#321353, FATE#323335).
- iwlwifi: mvm: take the transport ref back when leaving (FATE#321353, FATE#323335).
- iwlwifi: mvm: track low-latency sources separately (FATE#321353, FATE#323335).
- iwlwifi: mvm: unconditionally stop device after init (bsc#1031717).
- iwlwifi: mvm: unmap the paging memory before freeing it (FATE#321353, FATE#323335).
- iwlwifi: mvm: update GSCAN capabilities (FATE#321353, FATE#323335).
- iwlwifi: mvm: update ucode status before stopping device (FATE#321353, FATE#323335).
- iwlwifi: mvm: use build-time assertion for fw trigger ID (FATE#321353, FATE#323335).
- iwlwifi: mvm: use firmware station lookup, combine code (FATE#321353, FATE#323335).
- iwlwifi: mvm: various trivial cleanups (FATE#321353, FATE#323335).
- iwlwifi: mvm: writing zero bytes to debugfs causes a crash (FATE#321353, FATE#323335).
- iwlwifi: nvm: fix loading default NVM file (FATE#321353, FATE#323335).
- iwlwifi: nvm: fix up phy section when reading it (FATE#321353, FATE#323335).
- iwlwifi: pcie: add 9000 series multi queue rx DMA support (FATE#321353, FATE#323335).
- iwlwifi: pcie: add infrastructure for multi-queue rx (FATE#321353, FATE#323335).
- iwlwifi: pcie: add initial RTPM support for PCI (FATE#321353, FATE#323335).
- iwlwifi: pcie: Add new configuration to enable MSIX (FATE#321353, FATE#323335).
- iwlwifi: pcie: add pm_prepare and pm_complete ops (FATE#321353, FATE#323335).
- iwlwifi: pcie: add RTPM support when wifi is enabled (FATE#321353, FATE#323335).
- iwlwifi: pcie: aggregate Flow Handler configuration writes (FATE#321353, FATE#323335).
- iwlwifi: pcie: allow the op_mode to block the tx queues (FATE#321353, FATE#323335).
- iwlwifi: pcie: allow to pretend to have Tx CSUM for debug (FATE#321353, FATE#323335).
- iwlwifi: pcie: avoid restocks inside rx loop if not emergency (FATE#321353, FATE#323335).
- iwlwifi: pcie: buffer packets to avoid overflowing Tx queues (FATE#321353, FATE#323335).
- iwlwifi: pcie: build an A-MSDU using TSO core (FATE#321353, FATE#323335).
- iwlwifi: pcie: configure more RFH settings (FATE#321353, FATE#323335).
- iwlwifi: pcie: detect and workaround invalid write ptr behavior (FATE#321353, FATE#323335).
- iwlwifi: pcie: do not increment / decrement a bool (FATE#321353, FATE#323335).
- iwlwifi: pcie: enable interrupts before releasing the NIC's CPU (FATE#321353, FATE#323335).
- iwlwifi: pcie: enable multi-queue rx path (FATE#321353, FATE#323335).
- iwlwifi: pcie: extend device reset delay (FATE#321353, FATE#323335).
- iwlwifi: pcie: fine tune number of rxbs (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix a race in firmware loading flow (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix command completion name debug (bsc#1031717).
- iwlwifi: pcie: fix erroneous return value (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix global table size (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix identation in trans.c (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix RF-Kill vs. firmware load race (FATE#321353, FATE#323335).
- iwlwifi: pcie: forbid RTPM on device removal (FATE#321353, FATE#323335).
- iwlwifi: pcie: mark command queue lock with separate lockdep class (FATE#321353, FATE#323335).
- iwlwifi: pcie: prevent skbs shadowing in iwl_trans_pcie_reclaim (FATE#321353, FATE#323335).
- iwlwifi: pcie: refactor RXBs reclaiming code (FATE#321353, FATE#323335).
- iwlwifi: pcie: remove ICT allocation message (FATE#321353, FATE#323335).
- iwlwifi: pcie: remove pointer from debug message (FATE#321353, FATE#323335).
- iwlwifi: pcie: re-organize code towards TSO (FATE#321353, FATE#323335).
- iwlwifi: pcie: set RB chunk size back to 64 (FATE#321353, FATE#323335).
- iwlwifi: pcie: update iwl_mpdu_desc fields (FATE#321353, FATE#323335).
- iwlwifi: print index in api/capa flags parsing message (FATE#321353, FATE#323335).
- iwlwifi: refactor the code that reads the MAC address from the NVM (FATE#321353, FATE#323335).
- iwlwifi: remove IWL_DL_LED (FATE#321353, FATE#323335).
- iwlwifi: remove unused parameter from grab_nic_access (FATE#321353, FATE#323335).
- iwlwifi: replace d0i3_mode and wowlan_d0i3 with more generic variables (FATE#321353, FATE#323335).
- iwlwifi: set max firmware version of 7265 to 17 (FATE#321353, FATE#323335).
- iwlwifi: support ucode with d0 unified image - regular and usniffer (FATE#321353, FATE#323335).
- iwlwifi: trans: make various conversion macros inlines (FATE#321353, FATE#323335).
- iwlwifi: trans: support a callback for ASYNC commands (FATE#321353, FATE#323335).
- iwlwifi: treat iwl_parse_nvm_data() MAC addr as little endian (FATE#321353, FATE#323335).
- iwlwifi: tt: move ucode_loaded check under mutex (FATE#321353, FATE#323335).
- iwlwifi: uninline iwl_trans_send_cmd (FATE#321353, FATE#323335).
- iwlwifi: update host command messages to new format (FATE#321353, FATE#323335).
- iwlwifi: Update PCI IDs for 8000 and 9000 series (FATE#321353, FATE#323335).
- iwlwifi: update support for 3168 series firmware and NVM (FATE#321353, FATE#323335).
- iwlwifi: various comments and code cleanups (FATE#321353, FATE#323335).
- kABI-fix for 'x86/panic: replace smp_send_stop() with kdump friendly version in panic path' (bsc#1051478).
- kABI: protect lwtunnel include in ip6_route.h (kabi).
- KABI protect struct acpi_nfit_desc (bsc#1052325).
- kABI: protect struct iscsi_tpg_attrib (kabi).
- kABI: protect struct se_lun (kabi).
- kABI: protect struct tpm_chip (kabi).
- kABI: protect struct xfrm_dst (kabi).
- kABI: protect struct xfrm_dst (kabi).
- kabi/severities: add drivers/scsi/hisi_sas to kabi severities
- kabi/severities: ignore kABi changes in iwlwifi stuff itself
- kvm: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APIC (bsc#1051478).
- kvm: nVMX: Fix nested_vmx_check_msr_bitmap_controls (bsc#1051478).
- kvm: nVMX: Fix nested VPID vmx exec control (bsc#1051478).
- kvm: x86: avoid simultaneous queueing of both IRQ and SMI (bsc#1051478).
- libnvdimm: fix badblock range handling of ARS range (bsc#1023175).
- libnvdimm: fix badblock range handling of ARS range (bsc#1051048).
- libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1023175).
- libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1048919).
- libnvdimm, region: fix flush hint detection crash (bsc#1048919).
- lightnvm: fix 'warning: ‘ret’ may be used uninitialized' (FATE#319466).
- mac80211_hwsim: Replace bogus hrtimer clockid (bsc#1047651).
- md-cluster: Fix a memleak in an error handling path (bsc#1049289).
- md: do not return -EAGAIN in md_allow_write for external metadata arrays (bsc#1047174).
- md: fix sleep in atomic (bsc#1040351).
- mm: call page_ext_init() after all struct pages are initialized (VM Debugging Functionality, bsc#1047048).
- mm: fix classzone_idx underflow in shrink_zones() (VM Functionality, bsc#1042314).
- mm: make PR_SET_THP_DISABLE immediately active (bnc#1048891).
- mm, memory_hotplug: get rid of is_zone_device_section fix (bnc#1047595).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- mwifiex: do not update MCS set from hostapd (bsc#1031717).
- net: account for current skb length when deciding about UFO (bsc#1041958).
- net: add netdev_lockdep_set_classes() helper (fate#320485).
- net: ena: add hardware hints capability to the driver (bsc#1047121).
- net: ena: add hardware hints capability to the driver (bsc#1047121).
- net: ena: add missing return when ena_com_get_io_handlers() fails (bsc#1047121).
- net: ena: add missing return when ena_com_get_io_handlers() fails (bsc#1047121).
- net: ena: add missing unmap bars on device removal (bsc#1047121).
- net: ena: add missing unmap bars on device removal (bsc#1047121).
- net: ena: add reset reason for each device FLR (bsc#1047121).
- net: ena: add reset reason for each device FLR (bsc#1047121).
- net: ena: add support for out of order rx buffers refill (bsc#1047121).
- net: ena: add support for out of order rx buffers refill (bsc#1047121).
- net: ena: allow the driver to work with small number of msix vectors (bsc#1047121).
- net: ena: allow the driver to work with small number of msix vectors (bsc#1047121).
- net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
- net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
- net: ena: change return value for unsupported features unsupported return value (bsc#1047121).
- net: ena: change return value for unsupported features unsupported return value (bsc#1047121).
- net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
- net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
- net: ena: disable admin msix while working in polling mode (bsc#1047121).
- net: ena: disable admin msix while working in polling mode (bsc#1047121).
- net: ena: fix bug that might cause hang after consecutive open/close interface (bsc#1047121).
- net: ena: fix bug that might cause hang after consecutive open/close interface (bsc#1047121).
- net: ena: fix race condition between submit and completion admin command (bsc#1047121).
- net: ena: fix race condition between submit and completion admin command (bsc#1047121).
- net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
- net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
- net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
- net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
- net: ena: separate skb allocation to dedicated function (bsc#1047121).
- net: ena: separate skb allocation to dedicated function (bsc#1047121).
- net/ena: switch to pci_alloc_irq_vectors (bsc#1047121).
- net: ena: update driver's rx drop statistics (bsc#1047121).
- net: ena: update driver's rx drop statistics (bsc#1047121).
- net: ena: update ena driver to version 1.1.7 (bsc#1047121).
- net: ena: update ena driver to version 1.1.7 (bsc#1047121).
- net: ena: update ena driver to version 1.2.0 (bsc#1047121).
- net: ena: update ena driver to version 1.2.0 (bsc#1047121).
- net: ena: use lower_32_bits()/upper_32_bits() to split dma address (bsc#1047121).
- net: ena: use lower_32_bits()/upper_32_bits() to split dma address (bsc#1047121).
- net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
- net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
- net: handle NAPI_GRO_FREE_STOLEN_HEAD case also in napi_frags_finish() (bsc#1042286).
- net: hns: Bugfix for Tx timeout handling in hns driver (bsc#1048451).
- net: hyperv: use new api ethtool_{get|set}_link_ksettings (fate#320485).
- net/mlx4_core: Fixes missing capability bit in flags2 capability dump (bsc#1015337).
- net/mlx4_core: Fix namespace misalignment in QinQ VST support commit (bsc#1015337).
- net/mlx4_core: Fix sl_to_vl_change bit offset in flags2 dump (bsc#1015337).
- net/mlx5: Cancel delayed recovery work when unloading the driver (bsc#1015342).
- net/mlx5: Clean SRIOV eswitch resources upon VF creation failure (bsc#1015342).
- net/mlx5: Consider tx_enabled in all modes on remap (bsc#1015342).
- net/mlx5e: Add field select to MTPPS register (bsc#1015342).
- net/mlx5e: Add missing support for PTP_CLK_REQ_PPS request (bsc#1015342).
- net/mlx5e: Change 1PPS out scheme (bsc#1015342).
- net/mlx5e: Fix broken disable 1PPS flow (bsc#1015342).
- net/mlx5e: Fix outer_header_zero() check size (bsc#1015342).
- net/mlx5e: Fix TX carrier errors report in get stats ndo (bsc#1015342).
- net/mlx5e: Initialize CEE's getpermhwaddr address buffer to 0xff (bsc#1015342).
- net/mlx5e: Rename physical symbol errors counter (bsc#1015342).
- net/mlx5: Fix driver load error flow when firmware is stuck (git-fixes).
- net/mlx5: Fix mlx5_add_flow_rules call with correct num of dests (bsc#1015342).
- net/mlx5: Fix mlx5_ifc_mtpps_reg_bits structure size (bsc#1015342).
- net/mlx5: Fix offset of hca cap reserved field (bsc#1015342).
- net: phy: Do not perform software reset for Generic PHY (bsc#1042286).
- netvsc: add comments about callback's and NAPI (fate#320485).
- netvsc: Add #include's for csum_* function declarations (fate#320485).
- netvsc: add rtnl annotations in rndis (fate#320485).
- netvsc: add some rtnl_dereference annotations (fate#320485).
- netvsc: avoid race with callback (fate#320485).
- netvsc: change logic for change mtu and set_queues (fate#320485).
- netvsc: change max channel calculation (fate#320485).
- netvsc: change order of steps in setting queues (fate#320485).
- netvsc: Deal with rescinded channels correctly (fate#320485).
- netvsc: do not access netdev->num_rx_queues directly (fate#320485).
- netvsc: do not overload variable in same function (fate#320485).
- netvsc: do not print pointer value in error message (fate#320485).
- netvsc: eliminate unnecessary skb == NULL checks (fate#320485).
- netvsc: enable GRO (fate#320485).
- netvsc: Fix a bug in sub-channel handling (fate#320485).
- netvsc: fix and cleanup rndis_filter_set_packet_filter (fate#320485).
- netvsc: fix calculation of available send sections (fate#320485).
- netvsc: fix dereference before null check errors (fate#320485).
- netvsc: fix error unwind on device setup failure (fate#320485).
- netvsc: fix hang on netvsc module removal (fate#320485).
- netvsc: fix NAPI performance regression (fate#320485).
- netvsc: fix net poll mode (fate#320485).
- netvsc: fix netvsc_set_channels (fate#320485).
- netvsc: fix ptr_ret.cocci warnings (fate#320485).
- netvsc: fix rcu dereference warning from ethtool (fate#320485).
- netvsc: fix RCU warning in get_stats (fate#320485).
- netvsc: fix return value for set_channels (fate#320485).
- netvsc: fix rtnl deadlock on unregister of vf (fate#320485, bsc#1052442).
- netvsc: fix use after free on module removal (fate#320485).
- netvsc: fix warnings reported by lockdep (fate#320485).
- netvsc: fold in get_outbound_net_device (fate#320485).
- netvsc: force link update after MTU change (fate#320485).
- netvsc: handle offline mtu and channel change (fate#320485).
- netvsc: implement NAPI (fate#320485).
- netvsc: include rtnetlink.h (fate#320485).
- netvsc: Initialize all channel related state prior to opening the channel (fate#320485).
- netvsc: make sure and unregister datapath (fate#320485, bsc#1052899).
- netvsc: make sure napi enabled before vmbus_open (fate#320485).
- netvsc: mark error cases as unlikely (fate#320485).
- netvsc: move filter setting to rndis_device (fate#320485).
- netvsc: need napi scheduled during removal (fate#320485).
- netvsc: need rcu_derefence when accessing internal device info (fate#320485).
- netvsc: optimize calculation of number of slots (fate#320485).
- netvsc: optimize receive completions (fate#320485).
- netvsc: pass net_device to netvsc_init_buf and netvsc_connect_vsp (fate#320485).
- netvsc: prefetch the first incoming ring element (fate#320485).
- netvsc: Properly initialize the return value (fate#320485).
- netvsc: remove bogus rtnl_unlock (fate#320485).
- netvsc: remove no longer used max_num_rss queues (fate#320485).
- netvsc: Remove redundant use of ipv6_hdr() (fate#320485).
- netvsc: remove unnecessary indirection of page_buffer (fate#320485).
- netvsc: remove unnecessary lock on shutdown (fate#320485).
- netvsc: remove unused #define (fate#320485).
- netvsc: replace netdev_alloc_skb_ip_align with napi_alloc_skb (fate#320485).
- netvsc: save pointer to parent netvsc_device in channel table (fate#320485).
- netvsc: signal host if receive ring is emptied (fate#320485).
- netvsc: transparent VF management (fate#320485, bsc#1051979).
- netvsc: use ERR_PTR to avoid dereference issues (fate#320485).
- netvsc: use hv_get_bytes_to_read (fate#320485).
- netvsc: use napi_consume_skb (fate#320485).
- netvsc: use RCU to protect inner device structure (fate#320485).
- netvsc: uses RCU instead of removal flag (fate#320485).
- netvsc: use typed pointer for internal state (fate#320485).
- nfs: Cache aggressively when file is open for writing (bsc#1033587).
- nfs: Do not flush caches for a getattr that races with writeback (bsc#1033587).
- nfs: invalidate file size when taking a lock (git-fixes).
- nfs: only invalidate dentrys that are clearly invalid (bsc#1047118).
- nfs: Optimize fallocate by refreshing mapping when needed (git-fixes).
- nvme: add hostid token to fabric options (bsc#1045293).
- nvme: also provide a UUID in the WWID sysfs attribute (bsc#1048146).
- nvme: fabrics commands should use the fctype field for data direction (bsc#1043805).
- nvme-pci: fix CMB sysfs file removal in reset path (bsc#1050211).
- nvme/pci: Fix stuck nvme reset (bsc#1043805).
- nvmet: identify controller: improve standard compliance (bsc#1048146).
- nvme: wwid_show: strip trailing 0-bytes (bsc#1048146).
- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: fix deadlock caused by recursive locking in xattr (bsc#1012829).
- ocfs2: Make ocfs2_set_acl() static (bsc#1030552).
- pci: Add Mellanox device IDs (bsc#1051478).
- pci: Convert Mellanox broken INTx quirks to be for listed devices only (bsc#1051478).
- pci: Correct PCI_STD_RESOURCE_END usage (bsc#1051478).
- pci: dwc: dra7xx: Use RW1C for IRQSTATUS_MSI and IRQSTATUS_MAIN (bsc#1051478).
- pci: dwc: Fix uninitialized variable in dw_handle_msi_irq() (bsc#1051478).
- pci: Enable ECRC only if device supports it (bsc#1051478).
- pci: hv: Allocate interrupt descriptors with GFP_ATOMIC (fate#320295, bnc#1034113).
- pci: hv: Lock PCI bus on device eject (fate#320295, bnc#1034113). Replaces a change for (bnc#998664)
- pci/msi: fix the pci_alloc_irq_vectors_affinity stub (bsc#1050211).
- pci/msi: Ignore affinity if pre/post vector count is more than min_vecs (1050211).
- pci/pm: Fix native PME handling during system suspend/resume (bsc#1051478).
- pci: Support INTx masking on ConnectX-4 with firmware x.14.1100+ (bsc#1051478).
- perf/x86: Fix spurious NMI with PEBS Load Latency event (bsc#1051478).
- perf/x86/intel: Cure bogus unwind from PEBS entries (bsc#1051478).
- perf/x86/intel: Fix PEBSv3 record drain (bsc#1051478).
- pipe: cap initial pipe capacity according to pipe-max-size limit (bsc#1045330).
- platform/x86: ideapad-laptop: Add IdeaPad 310-15IKB to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add IdeaPad V310-15ISK to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add IdeaPad V510-15IKB to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Lenovo Yoga 910-13IKB to no_hw_rfkill dmi list (bsc#1051022).
- platform/x86: ideapad-laptop: Add several models to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y520-15IKBN to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y700 15-ACZ to no_hw_rfkill DMI list (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y720-15IKBN to no_hw_rfkill (bsc#1051022).
- pm / Hibernate: Fix scheduling while atomic during hibernation (bsc#1051059).
- powerpc: Add POWER9 architected mode to cputable (bsc#1048916, fate#321439).
- powerpc/fadump: Add a warning when 'fadump_reserve_mem=' is used (bsc#1049231).
- powerpc/ftrace: Pass the correct stack pointer for DYNAMIC_FTRACE_WITH_REGS (FATE#322421).
- powerpc/perf: Fix branch event code for power9 (fate#321438, Pending SUSE Kernel Fixes).
- powerpc/perf: Fix oops when kthread execs user process
- powerpc/perf: Fix SDAR_MODE value for continous sampling on Power9 (bsc#1053043 (git-fixes)).
- powerpc: Support POWER9 in architected mode (bsc#1048916, fate#321439).
- powerpc/tm: Fix saving of TM SPRs in core dump (fate#318470, git-fixes 08e1c01d6aed).
- prctl: propagate has_child_subreaper flag to every descendant (bnc#1022476).
- printk: Correctly handle preemption in console_unlock() (bsc#1046434).
- printk/xen: Force printk sync mode when migrating Xen guest (bsc#1043347).
- qed: Add missing static/local dcbx info (bsc#1019695).
- qed: Correct print in iscsi error-flow (bsc#1019695).
- qeth: fix L3 next-hop im xmit qeth hdr (bnc#1052773, LTC#157374).
- rbd: drop extra rbd_img_request_get (bsc#1045596).
- rbd: make sure pages are freed by libceph (bsc#1045596).
- rdma/bnxt_re: checking for NULL instead of IS_ERR() (bsc#1052925).
- rdma/iw_cxgb4: Always wake up waiter in c4iw_peer_abort_intr() (bsc#1026570).
- rdma/mlx5: Fix existence check for extended address vector (bsc#1015342).
- rdma/qedr: Prevent memory overrun in verbs' user responses (bsc#1022604 FATE#321747).
- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- Remove upstream commit e14b4db7a567 netvsc: fix race during initialization will be replaced by following changes
- reorder upstream commit d0c2c9973ecd net: use core MTU range checking in virt drivers
- Revert 'ACPI / video: Add force_native quirk for HP Pavilion dv6' (bsc#1031717).
- Revert 'Add 'shutdown' to 'struct class'.' (kabi).
- Revert 'KVM: x86: fix emulation of RSM and IRET instructions' (kabi).
- Revert 'Make file credentials available to the seqfile interfaces' (kabi).
- Revert 'mm/list_lru.c: fix list_lru_count_node() to be race free' (kabi).
- Revert 'netvsc: optimize calculation of number of slots' (fate#320485).
- Revert 'powerpc/numa: Fix percpu allocations to be NUMA aware' (bsc#1048914).
- Revert 'powerpc/numa: Fix percpu allocations to be NUMA aware' (bsc#1048914).
- Revert '/proc/iomem: only expose physical resource addresses to privileged users' (kabi).
- Revert 'tpm: Issue a TPM2_Shutdown for TPM2 devices.' (kabi).
- rpm/kernel-binary.spec.in: find-debuginfo.sh should not touch build-id This needs rpm-4.14+ (bsc#964063).
- s390/crash: Remove unused KEXEC_NOTE_BYTES (bsc#1049706).
- s390/kdump: remove code to create ELF notes in the crashed system (bsc#1049706).
- sched/core: Allow __sched_setscheduler() in interrupts when PI is not used (bnc#1022476).
- sched/debug: Print the scheduler topology group mask (bnc#1022476).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1022476).
- sched/fair: Fix O(nr_cgroups) in load balance path (bnc#1022476).
- sched/fair: Use task_groups instead of leaf_cfs_rq_list to walk all cfs_rqs (bnc#1022476).
- sched/topology: Add sched_group_capacity debugging (bnc#1022476).
- sched/topology: Fix building of overlapping sched-groups (bnc#1022476).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1022476).
- sched/topology: Move comment about asymmetric node setups (bnc#1022476).
- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1022476).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1022476).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1022476).
- sched/topology: Small cleanup (bnc#1022476).
- sched/topology: Verify the first group matches the child domain (bnc#1022476).
- scsi: aacraid: Do not copy uninitialized stack memory to userspace (bsc#1048912).
- scsi: aacraid: fix leak of data from stack back to userspace (bsc#1048912).
- scsi: aacraid: fix PCI error recovery path (bsc#1048912).
- scsi: Add STARGET_CREATE_REMOVE state to scsi_target_state (bsc#1013887).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi_devinfo: fixup string compare (bsc#1037404).
- scsi_dh_alua: suppress errors from unsupported devices (bsc#1038792).
- scsi: hisi_sas: add pci_dev in hisi_hba struct (bsc#1049298).
- scsi: hisi_sas: add v2 hw internal abort timeout workaround (bsc#1049298).
- scsi: hisi_sas: controller reset for multi-bits ECC and AXI fatal errors (bsc#1049298).
- scsi: hisi_sas: fix NULL deference when TMF timeouts (bsc#1049298).
- scsi: hisi_sas: fix timeout check in hisi_sas_internal_task_abort() (bsc#1049298).
- scsi: hisi_sas: optimise DMA slot memory (bsc#1049298).
- scsi: hisi_sas: optimise the usage of hisi_hba.lock (bsc#1049298).
- scsi: hisi_sas: relocate get_ata_protocol() (bsc#1049298).
- scsi: hisi_sas: workaround a SoC SATA IO processing bug (bsc#1049298).
- scsi: hisi_sas: workaround SoC about abort timeout bug (bsc#1049298).
- scsi: hisi_sas: workaround STP link SoC bug (bsc#1049298).
- scsi: kABI fix for new state STARGET_CREATED_REMOVE (bsc#1013887).
- scsi: lpfc: Add auto EQ delay logic (bsc#1042257).
- scsi: lpfc: Added recovery logic for running out of NVMET IO context resources (bsc#1037838).
- scsi: lpfc: Adding additional stats counters for nvme (bsc#1037838).
- scsi: lpfc: Add MDS Diagnostic support (bsc#1037838).
- scsi: lpfc: Cleanup entry_repost settings on SLI4 queues (bsc#1037838).
- scsi: lpfc: do not double count abort errors (bsc#1048912).
- scsi: lpfc: Driver responds LS_RJT to Beacon Off ELS - Linux (bsc#1044623).
- scsi: lpfc: Fix crash after firmware flash when IO is running (bsc#1044623).
- scsi: lpfc: Fix crash doing IO with resets (bsc#1044623).
- scsi: lpfc: Fix crash in lpfc_sli_ringtxcmpl_put when nvmet gets an abort request (bsc#1044623).
- scsi: lpfc: Fix debugfs root inode 'lpfc' not getting deleted on driver unload (bsc#1037838).
- scsi: lpfc: Fix defects reported by Coverity Scan (bsc#1042257).
- scsi: lpfc: fix linking against modular NVMe support (bsc#1048912).
- scsi: lpfc: Fix NMI watchdog assertions when running nvmet IOPS tests (bsc#1037838).
- scsi: lpfc: Fix NVMEI driver not decrementing counter causing bad rport state (bsc#1037838).
- scsi: lpfc: Fix nvme io stoppage after link bounce (bsc#1045404).
- scsi: lpfc: Fix NVMEI's handling of NVMET's PRLI response attributes (bsc#1037838).
- scsi: lpfc: Fix NVME I+T not registering NVME as a supported FC4 type (bsc#1037838).
- scsi: lpfc: Fix nvmet RQ resource needs for large block writes (bsc#1037838).
- scsi: lpfc: fix refcount error on node list (bsc#1045404).
- scsi: lpfc: Fix SLI3 drivers attempting NVME ELS commands (bsc#1044623).
- scsi: lpfc: Fix system crash when port is reset (bsc#1037838).
- scsi: lpfc: Fix system panic when express lane enabled (bsc#1044623).
- scsi: lpfc: Fix used-RPI accounting problem (bsc#1037838).
- scsi: lpfc: Reduce time spent in IRQ for received NVME commands (bsc#1044623).
- scsi: lpfc: Separate NVMET data buffer pool fir ELS/CT (bsc#1037838).
- scsi: lpfc: Separate NVMET RQ buffer posting from IO resources SGL/iocbq/context (bsc#1037838).
- scsi: lpfc: update to revision to 11.4.0.1 (bsc#1044623).
- scsi: lpfc: update version to 11.2.0.14 (bsc#1037838).
- scsi: lpfc: Vport creation is failing with 'Link Down' error (bsc#1044623).
- scsi: qedf: Fix a return value in case of error in 'qedf_alloc_global_queues' (bsc#1048912).
- scsi: qedi: Fix return code in qedi_ep_connect() (bsc#1048912).
- scsi: qedi: Remove WARN_ON for untracked cleanup (bsc#1044443).
- scsi: qedi: Remove WARN_ON from clear task context (bsc#1044443).
- scsi: storvsc: Prefer kcalloc over kzalloc with multiply (fate#320485).
- scsi: storvsc: remove return at end of void function (fate#320485).
- scsi: storvsc: Workaround for virtual DVD SCSI version (fate#320485, bnc#1044636).
- sfc: Add ethtool -m support for QSFP modules (bsc#1049619).
- smartpqi: limit transfer length to 1MB (bsc#1025461).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- sr9700: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- string.h: add memcpy_and_pad() (bsc#1048146).
- sysctl: do not print negative flag for proc_douintvec (bnc#1046985).
- Temporarily disable iwlwifi-expose-default-fallback-ucode-api ... for updating iwlwifi stack
- timers: Plug locking race vs. timer migration (bnc#1022476).
- tools: hv: Add clean up for included files in Ubuntu net config (fate#320485).
- tools: hv: Add clean up function for Ubuntu config (fate#320485).
- tools: hv: properly handle long paths (fate#320485).
- tools: hv: set allow-hotplug for VF on Ubuntu (fate#320485).
- tools: hv: set hotplug for VF on Suse (fate#320485).
- Tools: hv: vss: Thaw the filesystem and continue if freeze call has timed out (fate#320485).
- tpm: Issue a TPM2_Shutdown for TPM2 devices (bsc#1053117).
- tpm: KABI fix (bsc#1053117).
- tpm_tis: Fix IRQ autoprobing when using platform_device (bsc#1020645, fate#321435, fate#321507, fate#321600, Pending fixes 2017-07-06).
- tpm_tis: Use platform_get_irq (bsc#1020645, fate#321435, fate#321507, fate#321600, Pending fixes 2017-07-06).
- tpm/tpm_crb: fix priv->cmd_size initialisation (bsc#1020645, fate#321435, fate#321507, fate#321600, Pending SUSE Kernel Fixes).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1012829).
- udf: Fix races with i_size changes during readpage (bsc#1012829).
- Update config files: add CONFIG_IWLWIFI_PCIE_RTPM=y (FATE#323335)
- vfs: fix missing inode_get_dev sites (bsc#1052049).
- vmbus: cleanup header file style (fate#320485).
- vmbus: expose debug info for drivers (fate#320485).
- vmbus: fix spelling errors (fate#320485).
- vmbus: introduce in-place packet iterator (fate#320485).
- vmbus: only reschedule tasklet if time limit exceeded (fate#320485).
- vmbus: re-enable channel tasklet (fate#320485).
- vmbus: remove unnecessary initialization (fate#320485).
- vmbus: remove useless return's (fate#320485).
- x86/dmi: Switch dmi_remap() from ioremap() to ioremap_cache() (bsc#1051399).
- x86/hyperv: Check frequency MSRs presence according to the specification (fate#320485).
- x86/LDT: Print the real LDT base address (bsc#1051478).
- x86/mce: Make timer handling more robust (bsc#1042422).
- x86/panic: replace smp_send_stop() with kdump friendly version in panic path (bsc#1051478).
- x86/platform/uv/BAU: Disable BAU on single hub configurations (bsc#1050320).
- x86/platform/uv/BAU: Fix congested_response_us not taking effect (bsc#1050322).
- xen: allocate page for shared info page from low memory (bnc#1038616).
- xen/balloon: do not online new memory initially (bnc#1028173).
- xen: hold lock_device_hotplug throughout vcpu hotplug operations (bsc#1042422).
- xen-netfront: Rework the fix for Rx stall during OOM and network stress (git-fixes).
- xen/pvh*: Support > 32 VCPUs at domain restore (bnc#1045563).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).
- xfs: detect and trim torn writes during log recovery (bsc#1036215).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1050188).
- xfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- xfs: refactor and open code log record crc check (bsc#1036215).
- xfs: refactor log record start detection into a new helper (bsc#1036215).
- xfs: return start block of first bad log record during recovery (bsc#1036215).
- xfs: support a crc verification only log record pass (bsc#1036215).
- xgene: Do not fail probe, if there is no clk resource for SGMII interfaces (bsc#1048501).
- xilinx network drivers: disable (bsc#1046170).
Patchnames: SUSE-SLE-DESKTOP-12-SP3-2017-1404,SUSE-SLE-HA-12-SP3-2017-1404,SUSE-SLE-Live-Patching-12-SP3-2017-1404,SUSE-SLE-SDK-12-SP3-2017-1404,SUSE-SLE-SERVER-12-SP3-2017-1404,SUSE-SLE-WE-12-SP3-2017-1404
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.82 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-1000111: Fixed a race condition in net-packet code that could be exploited to cause out-of-bounds memory access (bsc#1052365).\n- CVE-2017-1000112: Fixed a race condition in net-packet code that could have been exploited by unprivileged users to gain root access. (bsc#1052311).\n- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \u0027double fetch\u0027 vulnerability (bnc#1037994).\n- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bnc#1049882).\n- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).\n- CVE-2017-7533: Race condition in the fsnotify implementation in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions (bnc#1049483 bnc#1050677).\n- CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet (bnc#1049645).\n- CVE-2017-10810: Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering object-initialization failures (bnc#1047277).\n\nThe following non-security bugs were fixed:\n\n- acpi/nfit: Add support of NVDIMM memory error notification in ACPI 6.2 (bsc#1052325).\n- acpi/nfit: Issue Start ARS to retrieve existing records (bsc#1052325).\n- acpi / processor: Avoid reserving IO regions too early (bsc#1051478).\n- acpi / scan: Prefer devices without _HID for _ADR matching (git-fixes).\n- Add \u0027shutdown\u0027 to \u0027struct class\u0027 (bsc#1053117).\n- af_key: Add lock to key dump (bsc#1047653).\n- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).\n- alsa: fm801: Initialize chip after IRQ handler is registered (bsc#1031717).\n- alsa: hda - add more ML register definitions (bsc#1048356).\n- alsa: hda - add sanity check to force the separate stream tags (bsc#1048356).\n- alsa: hda: Add support for parsing new HDA capabilities (bsc#1048356).\n- alsa: hdac: Add support for hda DMA Resume capability (bsc#1048356).\n- alsa: hdac_regmap - fix the register access for runtime PM (bsc#1048356).\n- alsa: hda: Fix cpu lockup when stopping the cmd dmas (bsc#1048356).\n- alsa: hda - Fix endless loop of codec configure (bsc#1031717).\n- alsa: hda: fix to wait for RIRB \u0026 CORB DMA to set (bsc#1048356).\n- alsa: hda - Loop interrupt handling until really cleared (bsc#1048356).\n- alsa: hda - move bus_parse_capabilities to core (bsc#1048356).\n- alsa: hda - set input_path bitmap to zero after moving it to new place (bsc#1031717).\n- alsa: hda - set intel audio clock to a proper value (bsc#1048356).\n- arm64: kernel: restrict /dev/mem read() calls to linear region (bsc#1046651).\n- arm64: mm: remove page_mapping check in __sync_icache_dcache (bsc#1040347).\n- arm64: Update config files. Disable DEVKMEM\n- b43: Add missing MODULE_FIRMWARE() (bsc#1037344).\n- bcache: force trigger gc (bsc#1038078).\n- bcache: only recovery I/O error for writethrough mode (bsc#1043652).\n- bcache: only recovery I/O error for writethrough mode (bsc#1043652).\n- bdi: Fix use-after-free in wb_congested_put() (bsc#1040307).\n- blacklist.conf: 9eeacd3a2f17 not a bug fix (bnc#1050061)\n- blacklist.conf: add inapplicable commits for wifi (bsc#1031717)\n- blacklist.conf: add non-applicable fixes for iwlwifi (FATE#323335)\n- blacklist.conf: add unapplicable/cosmetic iwlwifi fixes (bsc#1031717).\n- blacklist.conf: add unapplicable drm fixes (bsc#1031717).\n- blacklist.conf: Blacklist aa2369f11ff7 (\u0027mm/gup.c: fix access_ok() argument type\u0027) (bsc#1051478) Fixes only a compile-warning.\n- blacklist.conf: Blacklist c133c7615751 (\u0027x86/nmi: Fix timeout test in test_nmi_ipi()\u0027) It only fixes a self-test (bsc#1051478).\n- blacklist.conf: Blacklist c9525a3fab63 (\u0027x86/watchdog: Fix Kconfig help text file path reference to lockup watchdog documentation\u0027) Updates only kconfig help-text (bsc#1051478).\n- blkfront: add uevent for size change (bnc#1036632).\n- blk-mq: map all HWQ also in hyperthreaded system (bsc#1045866).\n- block: add kblock_mod_delayed_work_on() (bsc#1050211).\n- block: Allow bdi re-registration (bsc#1040307).\n- block: do not allow updates through sysfs until registration completes (bsc#1047027).\n- block: Fix front merge check (bsc#1051239).\n- block: Make blk_mq_delay_kick_requeue_list() rerun the queue at a quiet time (bsc#1050211).\n- block: Make del_gendisk() safer for disks without queues (bsc#1040307).\n- block: Move bdi_unregister() to del_gendisk() (bsc#1040307).\n- block: provide bio_uninit() free freeing integrity/task associations (bsc#1050211).\n- bluetooth: hidp: fix possible might sleep error in hidp_session_thread (bsc#1031784).\n- brcmfmac: Fix glom_skb leak in brcmf_sdiod_recv_chain (bsc#1031717).\n- btrfs: add cond_resched to btrfs_qgroup_trace_leaf_items (bsc#1028286).\n- btrfs: Add WARN_ON for qgroup reserved underflow (bsc#1031515).\n- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).\n- btrfs: fix lockup in find_free_extent with read-only block groups (bsc#1046682).\n- btrfs: incremental send, fix invalid path for link commands (bsc#1051479).\n- btrfs: incremental send, fix invalid path for unlink commands (bsc#1051479).\n- btrfs: Manually implement device_total_bytes getter/setter (bsc#1043912).\n- btrfs: resume qgroup rescan on rw remount (bsc#1047152).\n- btrfs: Round down values which are written for total_bytes_size (bsc#1043912).\n- btrfs: send, fix invalid path after renaming and linking file (bsc#1051479).\n- cifs: Fix some return values in case of error in \u0027crypt_message\u0027 (bnc#1047802).\n- clocksource/drivers/arm_arch_timer: Fix read and iounmap of incorrect variable (bsc#1045937).\n- cpuidle: dt: Add missing \u0027of_node_put()\u0027 (bnc#1022476).\n- crypto: s5p-sss - fix incorrect usage of scatterlists api (bsc#1048317).\n- cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc# 1045154).\n- cxgb4: fix a NULL dereference (bsc#1005778).\n- cxgb4: fix BUG() on interrupt deallocating path of ULD (bsc#1005778).\n- cxgb4: fix memory leak in init_one() (bsc#1005778).\n- cxl: Unlock on error in probe (bsc#1034762, Pending SUSE Kernel Fixes).\n- dentry name snapshots (bsc#1049483).\n- device-dax: fix sysfs attribute deadlock (bsc#1048919).\n- dm: fix second blk_delay_queue() parameter to be in msec units not (bsc#1047670).\n- dm: make flush bios explicitly sync (bsc#1050211).\n- dm raid1: fixes two crash cases if mirror leg failed (bsc#1043520)\n- drivers/char: kmem: disable on arm64 (bsc#1046655).\n- drivers: hv: As a bandaid, increase HV_UTIL_TIMEOUT from 30 to 60 seconds (bnc#1039153)\n- drivers: hv: Fix a typo (fate#320485).\n- drivers: hv: Fix the bug in generating the guest ID (fate#320485).\n- drivers: hv: util: Fix a typo (fate#320485).\n- drivers: hv: util: Make hv_poll_channel() a little more efficient (fate#320485).\n- drivers: hv: vmbus: Close timing hole that can corrupt per-cpu page (fate#320485).\n- drivers: hv: vmbus: Fix error code returned by vmbus_post_msg() (fate#320485).\n- drivers: hv: vmbus: Get the current time from the current clocksource (fate#320485, bnc#1044112).\n- drivers: hv: vmbus: Get the current time from the current clocksource (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).\n- drivers: hv: vmbus: Increase the time between retries in vmbus_post_msg() (fate#320485, bnc#1044112).\n- drivers: hv: vmbus: Increase the time between retries in vmbus_post_msg() (fate#320485, bnc#1044112).\n- drivers: hv: vmbus: Move the code to signal end of message (fate#320485).\n- drivers: hv: vmbus: Move the definition of generate_guest_id() (fate#320485).\n- drivers: hv: vmbus: Move the definition of hv_x64_msr_hypercall_contents (fate#320485).\n- drivers: hv: vmbus: Restructure the clockevents code (fate#320485).\n- drm/amdgpu: Fix overflow of watermark calcs at \u003e 4k resolutions (bsc#1031717).\n- drm/bochs: Implement nomodeset (bsc#1047096).\n- drm/i915/fbdev: Stop repeating tile configuration on stagnation (bsc#1031717).\n- drm/i915: Fix scaler init during CRTC HW state readout (bsc#1031717).\n- drm/i915: Serialize GTT/Aperture accesses on BXT (bsc#1046821).\n- drm/virtio: do not leak bo on drm_gem_object_init failure (bsc#1047277).\n- drm/vmwgfx: Fix large topology crash (bsc#1048155).\n- drm/vmwgfx: Support topology greater than texture size (bsc#1048155).\n- Drop patches; obsoleted by \u0027scsi: Add STARGET_CREATE_REMOVE state\u0027\n- efi/libstub: Skip GOP with PIXEL_BLT_ONLY format (bnc#974215).\n- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).\n- ext4: avoid unnecessary stalls in ext4_evict_inode() (bsc#1049486).\n- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).\n- ext4: handle the rest of ext4_mb_load_buddy() ENOMEM errors (bsc#1012829).\n- Fix kABI breakage by HD-audio bus caps extensions (bsc#1048356).\n- Fix kABI breakage by KVM CVE fix (bsc#1045922).\n- fs/fcntl: f_setown, avoid undefined behaviour (bnc#1006180).\n- fs: pass on flags in compat_writev (bsc#1050211).\n- fuse: initialize the flock flag in fuse_file on allocation (git-fixes).\n- gcov: add support for gcc version \u003e= 6 (bsc#1051663).\n- gcov: support GCC 7.1 (bsc#1051663).\n- gfs2: fix flock panic issue (bsc#1012829).\n- hpsa: limit transfer length to 1MB (bsc#1025461).\n- hrtimer: Catch invalid clockids again (bsc#1047651).\n- hrtimer: Revert CLOCK_MONOTONIC_RAW support (bsc#1047651).\n- hv_netvsc: change netvsc device default duplex to FULL (fate#320485).\n- hv_netvsc: Exclude non-TCP port numbers from vRSS hashing (bsc#1048421).\n- hv_netvsc: Fix the carrier state error when data path is off (fate#320485).\n- hv_netvsc: Fix the queue index computation in forwarding case (bsc#1048421).\n- hv_netvsc: Remove unnecessary var link_state from struct netvsc_device_info (fate#320485).\n- hv: print extra debug in kvp_on_msg in error paths (bnc#1039153).\n- hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485, bnc#1044112).\n- hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).\n- hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485, bnc#1044112).\n- hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).\n- hv_util: switch to using timespec64 (fate#320485).\n- hwpoison, memcg: forcibly uncharge LRU pages (bnc#1046105).\n- hyperv: fix warning about missing prototype (fate#320485).\n- hyperv: netvsc: Neaten netvsc_send_pkt by using a temporary (fate#320485).\n- hyperv: remove unnecessary return variable (fate#320485).\n- i2c: designware-baytrail: fix potential null pointer dereference on dev (bsc#1011913).\n- i40e: add hw struct local variable (bsc#1039915).\n- i40e: add private flag to control source pruning (bsc#1034075).\n- i40e: add VSI info to macaddr messages (bsc#1039915).\n- i40e: avoid looping to check whether we\u0027re in VLAN mode (bsc#1039915).\n- i40e: avoid O(n^2) loop when deleting all filters (bsc#1039915).\n- i40e: delete filter after adding its replacement when converting (bsc#1039915).\n- i40e: do not add broadcast filter for VFs (bsc#1039915).\n- i40e: do not allow i40e_vsi_(add|kill)_vlan to operate when VID\u003c1 (bsc#1039915).\n- i40e: drop is_vf and is_netdev fields in struct i40e_mac_filter (bsc#1039915).\n- i40e: enable VSI broadcast promiscuous mode instead of adding broadcast filter (bsc#1039915).\n- i40e: factor out addition/deletion of VLAN per each MAC address (bsc#1039915).\n- i40e: fix ethtool to get EEPROM data from X722 interface (bsc#1047418).\n- i40e: fix MAC filters when removing VLANs (bsc#1039915).\n- i40e: fold the i40e_is_vsi_in_vlan check into i40e_put_mac_in_vlan (bsc#1039915).\n- i40e/i40evf: Fix use after free in Rx cleanup path (bsc#1051689).\n- i40e: implement __i40e_del_filter and use where applicable (bsc#1039915).\n- i40e: make use of __dev_uc_sync and __dev_mc_sync (bsc#1039915).\n- i40e: move all updates for VLAN mode into i40e_sync_vsi_filters (bsc#1039915).\n- i40e: move i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).\n- i40e: no need to check is_vsi_in_vlan before calling i40e_del_mac_all_vlan (bsc#1039915).\n- i40e: properly cleanup on allocation failure in i40e_sync_vsi_filters (bsc#1039915).\n- i40e: recalculate vsi-\u003eactive_filters from hash contents (bsc#1039915).\n- i40e: refactor i40e_put_mac_in_vlan to avoid changing f-\u003evlan (bsc#1039915).\n- i40e: refactor i40e_update_filter_state to avoid passing aq_err (bsc#1039915).\n- i40e: refactor Rx filter handling (bsc#1039915).\n- i40e: Removal of workaround for simple MAC address filter deletion (bsc#1039915).\n- i40e: remove code to handle dev_addr specially (bsc#1039915).\n- i40e: removed unreachable code (bsc#1039915).\n- i40e: remove duplicate add/delete adminq command code for filters (bsc#1039915).\n- i40e: remove second check of VLAN_N_VID in i40e_vlan_rx_add_vid (bsc#1039915).\n- i40e: rename i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).\n- i40e: restore workaround for removing default MAC filter (bsc#1039915).\n- i40e: set broadcast promiscuous mode for each active VLAN (bsc#1039915).\n- i40e: store MAC/VLAN filters in a hash with the MAC Address as key (bsc#1039915).\n- i40e: use (add|rm)_vlan_all_mac helper functions when changing PVID (bsc#1039915).\n- i40evf: fix merge error in older patch (bsc#1024346 FATE#321239 bsc#1024373 FATE#321247).\n- i40e: when adding or removing MAC filters, correctly handle VLANs (bsc#1039915).\n- i40e: When searching all MAC/VLAN filters, ignore removed filters (bsc#1039915).\n- i40e: write HENA for VFs (bsc#1039915).\n- IB/hfi1: Wait for QSFP modules to initialize (bsc#1019151).\n- IB/iser: Fix connection teardown race condition (bsc#1050211).\n- ibmvnic: Check for transport event on driver resume (bsc#1051556, bsc#1052709).\n- ibmvnic: Initialize SCRQ\u0027s during login renegotiation (bsc#1052223).\n- ibmvnic: Report rx buffer return codes as netdev_dbg (bsc#1052794).\n- IB/rxe: Fix kernel panic from skb destructor (bsc#1049361).\n- iio: hid-sensor: fix return of -EINVAL on invalid values in ret or value (bsc#1031717).\n- include/linux/mmzone.h: simplify zone_intersects() (bnc#1047506).\n- input: gpio-keys - fix check for disabling unsupported keys (bsc#1031717).\n- introduce the walk_process_tree() helper (bnc#1022476).\n- iommu/amd: Add flush counters to struct dma_ops_domain (bsc#1045709).\n- iommu/amd: Add locking to per-domain flush-queue (bsc#1045709).\n- iommu/amd: Add new init-state IOMMU_CMDLINE_DISABLED (bsc#1045715).\n- iommu/amd: Add per-domain flush-queue data structures (bsc#1045709).\n- iommu/amd: Add per-domain timer to flush per-cpu queues (bsc#1045709).\n- iommu/amd: Check for error states first in iommu_go_to_state() (bsc#1045715).\n- iommu/amd: Constify irq_domain_ops (bsc#1045709).\n- iommu/amd: Disable IOMMUs at boot if they are enabled (bsc#1045715).\n- iommu/amd: Enable ga_log_intr when enabling guest_mode (bsc1052533).\n- iommu/amd: Fix interrupt remapping when disable guest_mode (bsc#1051471).\n- iommu/amd: Fix schedule-while-atomic BUG in initialization code (bsc1052533).\n- iommu/amd: Free already flushed ring-buffer entries before full-check (bsc#1045709).\n- iommu/amd: Free IOMMU resources when disabled on command line (bsc#1045715).\n- iommu/amd: Make use of the per-domain flush queue (bsc#1045709).\n- iommu/amd: Ratelimit io-page-faults per device (bsc#1045709).\n- iommu/amd: Reduce amount of MMIO when submitting commands (bsc#1045709).\n- iommu/amd: Reduce delay waiting for command buffer space (bsc#1045709).\n- iommu/amd: Remove amd_iommu_disabled check from amd_iommu_detect() (bsc#1045715).\n- iommu/amd: Remove queue_release() function (bsc#1045709).\n- iommu/amd: Rename free_on_init_error() (bsc#1045715).\n- iommu/amd: Rip out old queue flushing code (bsc#1045709).\n- iommu/amd: Set global pointers to NULL after freeing them (bsc#1045715).\n- iommu/amd: Suppress IO_PAGE_FAULTs in kdump kernel (bsc#1045715 bsc#1043261).\n- iommu: Remove a patch because it caused problems for users. See bsc#1048348.\n- ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output (bsc#1041958).\n- ipv6: Should use consistent conditional judgement for ip6 fragment between __ip6_append_data and ip6_finish_output (bsc#1041958).\n- iw_cxgb4: Fix error return code in c4iw_rdev_open() (bsc#1026570).\n- iwlwifi: 8000: fix MODULE_FIRMWARE input (FATE#321353, FATE#323335).\n- iwlwifi: 9000: increase the number of queues (FATE#321353, FATE#323335).\n- iwlwifi: add device ID for 8265 (FATE#321353, FATE#323335).\n- iwlwifi: add device IDs for the 8265 device (FATE#321353, FATE#323335).\n- iwlwifi: add disable_11ac module param (FATE#321353, FATE#323335).\n- iwlwifi: add new 3168 series devices support (FATE#321353, FATE#323335).\n- iwlwifi: add new 8260 PCI IDs (FATE#321353, FATE#323335).\n- iwlwifi: add new 8265 (FATE#321353, FATE#323335).\n- iwlwifi: add new 8265 series PCI ID (FATE#321353, FATE#323335).\n- iwlwifi: Add new PCI IDs for 9260 and 5165 series (FATE#321353, FATE#323335).\n- iwlwifi: Add PCI IDs for the new 3168 series (FATE#321353, FATE#323335).\n- iwlwifi: Add PCI IDs for the new series 8165 (FATE#321353, FATE#323335).\n- iwlwifi: add support for 12K Receive Buffers (FATE#321353, FATE#323335).\n- iwlwifi: add support for getting HW address from CSR (FATE#321353, FATE#323335).\n- iwlwifi: avoid d0i3 commands when no/init ucode is loaded (FATE#321353, FATE#323335).\n- iwlwifi: bail out in case of bad trans state (FATE#321353, FATE#323335).\n- iwlwifi: block the queues when we send ADD_STA for uAPSD (FATE#321353, FATE#323335).\n- iwlwifi: change the Intel Wireless email address (FATE#321353, FATE#323335).\n- iwlwifi: change the Intel Wireless email address (FATE#321353, FATE#323335).\n- iwlwifi: check for valid ethernet address provided by OEM (FATE#321353, FATE#323335).\n- iwlwifi: clean up transport debugfs handling (FATE#321353, FATE#323335).\n- iwlwifi: clear ieee80211_tx_info-\u003edriver_data in the op_mode (FATE#321353, FATE#323335).\n- iwlwifi: Document missing module options (FATE#321353, FATE#323335).\n- iwlwifi: dump prph registers in a common place for all transports (FATE#321353, FATE#323335).\n- iwlwifi: dvm: advertise NETIF_F_SG (FATE#321353, FATE#323335).\n- iwlwifi: dvm: fix compare_const_fl.cocci warnings (FATE#321353, FATE#323335).\n- iwlwifi: dvm: handle zero brightness for wifi LED (FATE#321353, FATE#323335).\n- iwlwifi: dvm: remove a wrong dependency on m (FATE#321353, FATE#323335).\n- iwlwifi: dvm: remove Kconfig default (FATE#321353, FATE#323335).\n- iwlwifi: dvm: remove stray debug code (FATE#321353, FATE#323335).\n- iwlwifi: export the _no_grab version of PRPH IO functions (FATE#321353, FATE#323335).\n- iwlwifi: expose fw usniffer mode to more utilities (FATE#321353, FATE#323335).\n- iwlwifi: fix double hyphen in MODULE_FIRMWARE for 8000 (FATE#321353, FATE#323335).\n- iwlwifi: Fix firmware name maximum length definition (FATE#321353, FATE#323335).\n- iwlwifi: fix name of ucode loaded for 8265 series (FATE#321353, FATE#323335).\n- iwlwifi: fix printf specifier (FATE#321353, FATE#323335).\n- iwlwifi: generalize d0i3_entry_timeout module parameter (FATE#321353, FATE#323335).\n- iwlwifi: missing error code in iwl_trans_pcie_alloc() (bsc#1031717).\n- iwlwifi: mvm: adapt the firmware assert log to new firmware (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add 9000-series RX API (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add 9000 series RX processing (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add a non-trigger window to fw dbg triggers (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add an option to start rs from HT/VHT rates (FATE#321353, FATE#323335).\n- iwlwifi: mvm: Add a station in monitor mode (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add bt rrc and ttc to debugfs (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add bt settings to debugfs (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add ctdp operations to debugfs (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add CT-KILL notification (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add debug print if scan config is ignored (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add extended dwell time (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add new ADD_STA command version (FATE#321353, FATE#323335).\n- iwlwifi: mvm: Add P2P client snoozing (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add registration to cooling device (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add registration to thermal zone (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add support for negative temperatures (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add tlv for multi queue rx support (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add trigger for firmware dump upon TDLS events (FATE#321353, FATE#323335).\n- iwlwifi: mvm: add trigger for firmware dump upon TX response status (FATE#321353, FATE#323335).\n- iwlwifi: mvm: advertise NETIF_F_SG (FATE#321353, FATE#323335).\n- iwlwifi: mvm: Align bt-coex priority with requirements (FATE#321353, FATE#323335).\n- iwlwifi: mvm: allow to disable beacon filtering for AP/GO interface (FATE#321353, FATE#323335).\n- iwlwifi: mvm: avoid harmless -Wmaybe-uninialized warning (FATE#321353, FATE#323335).\n- iwlwifi: mvm: avoid panics with thermal device usage (FATE#321353, FATE#323335).\n- iwlwifi: mvm: avoid to WARN about gscan capabilities (FATE#321353, FATE#323335).\n- iwlwifi: mvm: bail out if CTDP start operation fails (FATE#321353, FATE#323335).\n- iwlwifi: mvm: bump firmware API to 21 (FATE#321353, FATE#323335).\n- iwlwifi: mvm: bump max API to 20 (FATE#321353, FATE#323335).\n- iwlwifi: mvm: change access to ieee80211_hdr (FATE#321353, FATE#323335).\n- iwlwifi: mvm: change iwl_mvm_get_key_sta_id() to return the station (FATE#321353, FATE#323335).\n- iwlwifi: mvm: change mcc update API (FATE#321353, FATE#323335).\n- iwlwifi: mvm: change name of iwl_mvm_d3_update_gtk (FATE#321353, FATE#323335).\n- iwlwifi: mvm: Change number of associated stations when station becomes associated (FATE#321353, FATE#323335).\n- iwlwifi: mvm: change protocol offload flows (FATE#321353, FATE#323335).\n- iwlwifi: mvm: change the check for ADD_STA status (FATE#321353, FATE#323335).\n- iwlwifi: mvm: check FW\u0027s response for nvm access write cmd (FATE#321353, FATE#323335).\n- iwlwifi: mvm: check iwl_mvm_wowlan_config_key_params() return value (FATE#321353, FATE#323335).\n- iwlwifi: mvm: check minimum temperature notification length (FATE#321353, FATE#323335).\n- iwlwifi: mvm: cleanup roc te on restart cleanup (FATE#321353, FATE#323335).\n- iwlwifi: mvm: compare full command ID (FATE#321353, FATE#323335).\n- iwlwifi: mvm: Configure fragmented scan for scheduled scan (FATE#321353, FATE#323335).\n- iwlwifi: mvm: configure scheduled scan according to traffic conditions (FATE#321353, FATE#323335).\n- iwlwifi: mvm: constify the parameters of a few functions in fw-dbg.c (FATE#321353, FATE#323335).\n- iwlwifi: mvm: Disable beacon storing in D3 when WOWLAN configured (FATE#321353, FATE#323335).\n- iwlwifi: mvm: disable DQA support (FATE#321353, FATE#323335).\n- iwlwifi: mvm: do not ask beacons when P2P GO vif and no assoc sta (FATE#321353, FATE#323335).\n- iwlwifi: mvm: do not keep an mvm ref when the interface is down (FATE#321353, FATE#323335).\n- iwlwifi: mvm: do not let NDPs mess the packet tracking (FATE#321353, FATE#323335).\n- iwlwifi: mvm: do not restart HW if suspend fails with unified image (FATE#321353, FATE#323335).\n- iwlwifi: mvm: Do not switch to D3 image on suspend (FATE#321353, FATE#323335).\n- iwlwifi: mvm: do not try to offload AES-CMAC in AP/IBSS modes (FATE#321353, FATE#323335).\n- iwlwifi: mvm: drop low_latency_agg_frame_cnt_limit (FATE#321353, FATE#323335).\n- iwlwifi: mvm: dump more registers upon error (FATE#321353, FATE#323335).\n- iwlwifi: mvm: dump the radio registers when the firmware crashes (FATE#321353, FATE#323335).\n- iwlwifi: mvm: enable L3 filtering (FATE#321353, FATE#323335).\n- iwlwifi: mvm: Enable MPLUT only on supported hw (FATE#321353, FATE#323335).\n- iwlwifi: mvm: enable VHT MU-MIMO for supported hardware (FATE#321353, FATE#323335).\n- iwlwifi: mvm: extend time event duration (FATE#321353, FATE#323335).\n- iwlwifi: mvm: fix accessing Null pointer during fw dump collection (FATE#321353, FATE#323335).\n- iwlwifi: mvm: fix d3_test with unified D0/D3 images (FATE#321353, FATE#323335).\n- iwlwifi: mvm: fix debugfs signedness warning (FATE#321353, FATE#323335).\n- iwlwifi: mvm: fix extended dwell time (FATE#321353, FATE#323335).\n- iwlwifi: mvm: fix incorrect fallthrough in iwl_mvm_check_running_scans() (FATE#321353, FATE#323335).\n- iwlwifi: mvm: fix memory leaks in error paths upon fw error dump (FATE#321353, FATE#323335).\n- iwlwifi: mvm: fix netdetect starting/stopping for unified images (FATE#321353, FATE#323335).\n- iwlwifi: mvm: fix RSS key sizing (FATE#321353, FATE#323335).\n- iwlwifi: mvm: fix unregistration of thermal in some error flows (FATE#321353, FATE#323335).\n- iwlwifi: mvm: flush all used TX queues before suspending (FATE#321353, FATE#323335).\n- iwlwifi: mvm: forbid U-APSD for P2P Client if the firmware does not support it (FATE#321353, FATE#323335).\n- iwlwifi: mvm: handle pass all scan reporting (FATE#321353, FATE#323335).\n- iwlwifi: mvm: ignore LMAC scan notifications when running UMAC scans (FATE#321353, FATE#323335).\n- iwlwifi: mvm: infrastructure for frame-release message (FATE#321353, FATE#323335).\n- iwlwifi: mvm: kill iwl_mvm_enable_agg_txq (FATE#321353, FATE#323335).\n- iwlwifi: mvm: let the firmware choose the antenna for beacons (FATE#321353, FATE#323335).\n- iwlwifi: mvm: make collecting fw debug data optional (FATE#321353, FATE#323335).\n- iwlwifi: mvm: move fw-dbg code to separate file (FATE#321353, FATE#323335).\n- iwlwifi: mvm: only release the trans ref if d0i3 is supported in fw (FATE#321353, FATE#323335).\n- iwlwifi: mvm: prepare the code towards TSO implementation (FATE#321353, FATE#323335).\n- iwlwifi: mvm: refactor d3 key update functions (FATE#321353, FATE#323335).\n- iwlwifi: mvm: refactor the way fw_key_table is handled (FATE#321353, FATE#323335).\n- iwlwifi: mvm: remove an extra tab (FATE#321353, FATE#323335).\n- iwlwifi: mvm: Remove bf_vif from iwl_power_vifs (FATE#321353, FATE#323335).\n- iwlwifi: mvm: Remove iwl_mvm_update_beacon_abort (FATE#321353, FATE#323335).\n- iwlwifi: mvm: remove redundant d0i3 flag from the config struct (FATE#321353, FATE#323335).\n- iwlwifi: mvm: remove shadowing variable (FATE#321353, FATE#323335).\n- iwlwifi: mvm: remove stray nd_config element (FATE#321353, FATE#323335).\n- iwlwifi: mvm: remove the vif parameter of iwl_mvm_configure_bcast_filter() (FATE#321353, FATE#323335).\n- iwlwifi: mvm: remove unnecessary check in iwl_mvm_is_d0i3_supported() (FATE#321353, FATE#323335).\n- iwlwifi: mvm: remove useless WARN_ON and rely on cfg80211\u0027s combination (FATE#321353, FATE#323335).\n- iwlwifi: mvm: report wakeup for wowlan (FATE#321353, FATE#323335).\n- iwlwifi: mvm: reset mvm-\u003escan_type when firmware is started (FATE#321353, FATE#323335).\n- iwlwifi: mvm: reset the fw_dump_desc pointer after ASSERT (bsc#1031717).\n- iwlwifi: mvm: return the cooling state index instead of the budget (FATE#321353, FATE#323335).\n- iwlwifi: mvm: ROC: cleanup time event info on FW failure (FATE#321353, FATE#323335).\n- iwlwifi: mvm: ROC: Extend the ROC max delay duration \u0026 limit ROC duration (FATE#321353, FATE#323335).\n- iwlwifi: mvm: rs: fix a potential out of bounds access (FATE#321353, FATE#323335).\n- iwlwifi: mvm: rs: fix a theoretical access to uninitialized array elements (FATE#321353, FATE#323335).\n- iwlwifi: mvm: rs: fix a warning message (FATE#321353, FATE#323335).\n- iwlwifi: mvm: rs: fix TPC action decision algorithm (FATE#321353, FATE#323335).\n- iwlwifi: mvm: rs: fix TPC statistics handling (FATE#321353, FATE#323335).\n- iwlwifi: mvm: Send power command on BSS_CHANGED_BEACON_INFO if needed (FATE#321353, FATE#323335).\n- iwlwifi: mvm: set default new STA as non-aggregated (FATE#321353, FATE#323335).\n- iwlwifi: mvm: set the correct amsdu enum values (FATE#321353, FATE#323335).\n- iwlwifi: mvm: set the correct descriptor size for tracing (FATE#321353, FATE#323335).\n- iwlwifi: mvm: small update in the firmware API (FATE#321353, FATE#323335).\n- iwlwifi: mvm: support A-MSDU in A-MPDU (FATE#321353, FATE#323335).\n- iwlwifi: mvm: support beacon storing (FATE#321353, FATE#323335).\n- iwlwifi: mvm: support description for user triggered fw dbg collection (FATE#321353, FATE#323335).\n- iwlwifi: mvm: support rss queues configuration command (FATE#321353, FATE#323335).\n- iwlwifi: mvm: Support setting continuous recording debug mode (FATE#321353, FATE#323335).\n- iwlwifi: mvm: support setting minimum quota from debugfs (FATE#321353, FATE#323335).\n- iwlwifi: mvm: support sw queue start/stop from mvm (FATE#321353, FATE#323335).\n- iwlwifi: mvm: synchronize firmware DMA paging memory (FATE#321353, FATE#323335).\n- iwlwifi: mvm: take care of padded packets (FATE#321353, FATE#323335).\n- iwlwifi: mvm: take the transport ref back when leaving (FATE#321353, FATE#323335).\n- iwlwifi: mvm: track low-latency sources separately (FATE#321353, FATE#323335).\n- iwlwifi: mvm: unconditionally stop device after init (bsc#1031717).\n- iwlwifi: mvm: unmap the paging memory before freeing it (FATE#321353, FATE#323335).\n- iwlwifi: mvm: update GSCAN capabilities (FATE#321353, FATE#323335).\n- iwlwifi: mvm: update ucode status before stopping device (FATE#321353, FATE#323335).\n- iwlwifi: mvm: use build-time assertion for fw trigger ID (FATE#321353, FATE#323335).\n- iwlwifi: mvm: use firmware station lookup, combine code (FATE#321353, FATE#323335).\n- iwlwifi: mvm: various trivial cleanups (FATE#321353, FATE#323335).\n- iwlwifi: mvm: writing zero bytes to debugfs causes a crash (FATE#321353, FATE#323335).\n- iwlwifi: nvm: fix loading default NVM file (FATE#321353, FATE#323335).\n- iwlwifi: nvm: fix up phy section when reading it (FATE#321353, FATE#323335).\n- iwlwifi: pcie: add 9000 series multi queue rx DMA support (FATE#321353, FATE#323335).\n- iwlwifi: pcie: add infrastructure for multi-queue rx (FATE#321353, FATE#323335).\n- iwlwifi: pcie: add initial RTPM support for PCI (FATE#321353, FATE#323335).\n- iwlwifi: pcie: Add new configuration to enable MSIX (FATE#321353, FATE#323335).\n- iwlwifi: pcie: add pm_prepare and pm_complete ops (FATE#321353, FATE#323335).\n- iwlwifi: pcie: add RTPM support when wifi is enabled (FATE#321353, FATE#323335).\n- iwlwifi: pcie: aggregate Flow Handler configuration writes (FATE#321353, FATE#323335).\n- iwlwifi: pcie: allow the op_mode to block the tx queues (FATE#321353, FATE#323335).\n- iwlwifi: pcie: allow to pretend to have Tx CSUM for debug (FATE#321353, FATE#323335).\n- iwlwifi: pcie: avoid restocks inside rx loop if not emergency (FATE#321353, FATE#323335).\n- iwlwifi: pcie: buffer packets to avoid overflowing Tx queues (FATE#321353, FATE#323335).\n- iwlwifi: pcie: build an A-MSDU using TSO core (FATE#321353, FATE#323335).\n- iwlwifi: pcie: configure more RFH settings (FATE#321353, FATE#323335).\n- iwlwifi: pcie: detect and workaround invalid write ptr behavior (FATE#321353, FATE#323335).\n- iwlwifi: pcie: do not increment / decrement a bool (FATE#321353, FATE#323335).\n- iwlwifi: pcie: enable interrupts before releasing the NIC\u0027s CPU (FATE#321353, FATE#323335).\n- iwlwifi: pcie: enable multi-queue rx path (FATE#321353, FATE#323335).\n- iwlwifi: pcie: extend device reset delay (FATE#321353, FATE#323335).\n- iwlwifi: pcie: fine tune number of rxbs (FATE#321353, FATE#323335).\n- iwlwifi: pcie: fix a race in firmware loading flow (FATE#321353, FATE#323335).\n- iwlwifi: pcie: fix command completion name debug (bsc#1031717).\n- iwlwifi: pcie: fix erroneous return value (FATE#321353, FATE#323335).\n- iwlwifi: pcie: fix global table size (FATE#321353, FATE#323335).\n- iwlwifi: pcie: fix identation in trans.c (FATE#321353, FATE#323335).\n- iwlwifi: pcie: fix RF-Kill vs. firmware load race (FATE#321353, FATE#323335).\n- iwlwifi: pcie: forbid RTPM on device removal (FATE#321353, FATE#323335).\n- iwlwifi: pcie: mark command queue lock with separate lockdep class (FATE#321353, FATE#323335).\n- iwlwifi: pcie: prevent skbs shadowing in iwl_trans_pcie_reclaim (FATE#321353, FATE#323335).\n- iwlwifi: pcie: refactor RXBs reclaiming code (FATE#321353, FATE#323335).\n- iwlwifi: pcie: remove ICT allocation message (FATE#321353, FATE#323335).\n- iwlwifi: pcie: remove pointer from debug message (FATE#321353, FATE#323335).\n- iwlwifi: pcie: re-organize code towards TSO (FATE#321353, FATE#323335).\n- iwlwifi: pcie: set RB chunk size back to 64 (FATE#321353, FATE#323335).\n- iwlwifi: pcie: update iwl_mpdu_desc fields (FATE#321353, FATE#323335).\n- iwlwifi: print index in api/capa flags parsing message (FATE#321353, FATE#323335).\n- iwlwifi: refactor the code that reads the MAC address from the NVM (FATE#321353, FATE#323335).\n- iwlwifi: remove IWL_DL_LED (FATE#321353, FATE#323335).\n- iwlwifi: remove unused parameter from grab_nic_access (FATE#321353, FATE#323335).\n- iwlwifi: replace d0i3_mode and wowlan_d0i3 with more generic variables (FATE#321353, FATE#323335).\n- iwlwifi: set max firmware version of 7265 to 17 (FATE#321353, FATE#323335).\n- iwlwifi: support ucode with d0 unified image - regular and usniffer (FATE#321353, FATE#323335).\n- iwlwifi: trans: make various conversion macros inlines (FATE#321353, FATE#323335).\n- iwlwifi: trans: support a callback for ASYNC commands (FATE#321353, FATE#323335).\n- iwlwifi: treat iwl_parse_nvm_data() MAC addr as little endian (FATE#321353, FATE#323335).\n- iwlwifi: tt: move ucode_loaded check under mutex (FATE#321353, FATE#323335).\n- iwlwifi: uninline iwl_trans_send_cmd (FATE#321353, FATE#323335).\n- iwlwifi: update host command messages to new format (FATE#321353, FATE#323335).\n- iwlwifi: Update PCI IDs for 8000 and 9000 series (FATE#321353, FATE#323335).\n- iwlwifi: update support for 3168 series firmware and NVM (FATE#321353, FATE#323335).\n- iwlwifi: various comments and code cleanups (FATE#321353, FATE#323335).\n- kABI-fix for \u0027x86/panic: replace smp_send_stop() with kdump friendly version in panic path\u0027 (bsc#1051478).\n- kABI: protect lwtunnel include in ip6_route.h (kabi).\n- KABI protect struct acpi_nfit_desc (bsc#1052325).\n- kABI: protect struct iscsi_tpg_attrib (kabi).\n- kABI: protect struct se_lun (kabi).\n- kABI: protect struct tpm_chip (kabi).\n- kABI: protect struct xfrm_dst (kabi).\n- kABI: protect struct xfrm_dst (kabi).\n- kabi/severities: add drivers/scsi/hisi_sas to kabi severities\n- kabi/severities: ignore kABi changes in iwlwifi stuff itself\n- kvm: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APIC (bsc#1051478).\n- kvm: nVMX: Fix nested_vmx_check_msr_bitmap_controls (bsc#1051478).\n- kvm: nVMX: Fix nested VPID vmx exec control (bsc#1051478).\n- kvm: x86: avoid simultaneous queueing of both IRQ and SMI (bsc#1051478).\n- libnvdimm: fix badblock range handling of ARS range (bsc#1023175).\n- libnvdimm: fix badblock range handling of ARS range (bsc#1051048).\n- libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1023175).\n- libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1048919).\n- libnvdimm, region: fix flush hint detection crash (bsc#1048919).\n- lightnvm: fix \u0027warning: \u2018ret\u2019 may be used uninitialized\u0027 (FATE#319466).\n- mac80211_hwsim: Replace bogus hrtimer clockid (bsc#1047651).\n- md-cluster: Fix a memleak in an error handling path (bsc#1049289).\n- md: do not return -EAGAIN in md_allow_write for external metadata arrays (bsc#1047174).\n- md: fix sleep in atomic (bsc#1040351).\n- mm: call page_ext_init() after all struct pages are initialized (VM Debugging Functionality, bsc#1047048).\n- mm: fix classzone_idx underflow in shrink_zones() (VM Functionality, bsc#1042314).\n- mm: make PR_SET_THP_DISABLE immediately active (bnc#1048891).\n- mm, memory_hotplug: get rid of is_zone_device_section fix (bnc#1047595).\n- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).\n- mwifiex: do not update MCS set from hostapd (bsc#1031717).\n- net: account for current skb length when deciding about UFO (bsc#1041958).\n- net: add netdev_lockdep_set_classes() helper (fate#320485).\n- net: ena: add hardware hints capability to the driver (bsc#1047121).\n- net: ena: add hardware hints capability to the driver (bsc#1047121).\n- net: ena: add missing return when ena_com_get_io_handlers() fails (bsc#1047121).\n- net: ena: add missing return when ena_com_get_io_handlers() fails (bsc#1047121).\n- net: ena: add missing unmap bars on device removal (bsc#1047121).\n- net: ena: add missing unmap bars on device removal (bsc#1047121).\n- net: ena: add reset reason for each device FLR (bsc#1047121).\n- net: ena: add reset reason for each device FLR (bsc#1047121).\n- net: ena: add support for out of order rx buffers refill (bsc#1047121).\n- net: ena: add support for out of order rx buffers refill (bsc#1047121).\n- net: ena: allow the driver to work with small number of msix vectors (bsc#1047121).\n- net: ena: allow the driver to work with small number of msix vectors (bsc#1047121).\n- net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).\n- net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).\n- net: ena: change return value for unsupported features unsupported return value (bsc#1047121).\n- net: ena: change return value for unsupported features unsupported return value (bsc#1047121).\n- net: ena: change sizeof() argument to be the type pointer (bsc#1047121).\n- net: ena: change sizeof() argument to be the type pointer (bsc#1047121).\n- net: ena: disable admin msix while working in polling mode (bsc#1047121).\n- net: ena: disable admin msix while working in polling mode (bsc#1047121).\n- net: ena: fix bug that might cause hang after consecutive open/close interface (bsc#1047121).\n- net: ena: fix bug that might cause hang after consecutive open/close interface (bsc#1047121).\n- net: ena: fix race condition between submit and completion admin command (bsc#1047121).\n- net: ena: fix race condition between submit and completion admin command (bsc#1047121).\n- net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).\n- net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).\n- net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).\n- net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).\n- net: ena: separate skb allocation to dedicated function (bsc#1047121).\n- net: ena: separate skb allocation to dedicated function (bsc#1047121).\n- net/ena: switch to pci_alloc_irq_vectors (bsc#1047121).\n- net: ena: update driver\u0027s rx drop statistics (bsc#1047121).\n- net: ena: update driver\u0027s rx drop statistics (bsc#1047121).\n- net: ena: update ena driver to version 1.1.7 (bsc#1047121).\n- net: ena: update ena driver to version 1.1.7 (bsc#1047121).\n- net: ena: update ena driver to version 1.2.0 (bsc#1047121).\n- net: ena: update ena driver to version 1.2.0 (bsc#1047121).\n- net: ena: use lower_32_bits()/upper_32_bits() to split dma address (bsc#1047121).\n- net: ena: use lower_32_bits()/upper_32_bits() to split dma address (bsc#1047121).\n- net: ena: use napi_schedule_irqoff when possible (bsc#1047121).\n- net: ena: use napi_schedule_irqoff when possible (bsc#1047121).\n- net: handle NAPI_GRO_FREE_STOLEN_HEAD case also in napi_frags_finish() (bsc#1042286).\n- net: hns: Bugfix for Tx timeout handling in hns driver (bsc#1048451).\n- net: hyperv: use new api ethtool_{get|set}_link_ksettings (fate#320485).\n- net/mlx4_core: Fixes missing capability bit in flags2 capability dump (bsc#1015337).\n- net/mlx4_core: Fix namespace misalignment in QinQ VST support commit (bsc#1015337).\n- net/mlx4_core: Fix sl_to_vl_change bit offset in flags2 dump (bsc#1015337).\n- net/mlx5: Cancel delayed recovery work when unloading the driver (bsc#1015342).\n- net/mlx5: Clean SRIOV eswitch resources upon VF creation failure (bsc#1015342).\n- net/mlx5: Consider tx_enabled in all modes on remap (bsc#1015342).\n- net/mlx5e: Add field select to MTPPS register (bsc#1015342).\n- net/mlx5e: Add missing support for PTP_CLK_REQ_PPS request (bsc#1015342).\n- net/mlx5e: Change 1PPS out scheme (bsc#1015342).\n- net/mlx5e: Fix broken disable 1PPS flow (bsc#1015342).\n- net/mlx5e: Fix outer_header_zero() check size (bsc#1015342).\n- net/mlx5e: Fix TX carrier errors report in get stats ndo (bsc#1015342).\n- net/mlx5e: Initialize CEE\u0027s getpermhwaddr address buffer to 0xff (bsc#1015342).\n- net/mlx5e: Rename physical symbol errors counter (bsc#1015342).\n- net/mlx5: Fix driver load error flow when firmware is stuck (git-fixes).\n- net/mlx5: Fix mlx5_add_flow_rules call with correct num of dests (bsc#1015342).\n- net/mlx5: Fix mlx5_ifc_mtpps_reg_bits structure size (bsc#1015342).\n- net/mlx5: Fix offset of hca cap reserved field (bsc#1015342).\n- net: phy: Do not perform software reset for Generic PHY (bsc#1042286).\n- netvsc: add comments about callback\u0027s and NAPI (fate#320485).\n- netvsc: Add #include\u0027s for csum_* function declarations (fate#320485).\n- netvsc: add rtnl annotations in rndis (fate#320485).\n- netvsc: add some rtnl_dereference annotations (fate#320485).\n- netvsc: avoid race with callback (fate#320485).\n- netvsc: change logic for change mtu and set_queues (fate#320485).\n- netvsc: change max channel calculation (fate#320485).\n- netvsc: change order of steps in setting queues (fate#320485).\n- netvsc: Deal with rescinded channels correctly (fate#320485).\n- netvsc: do not access netdev-\u003enum_rx_queues directly (fate#320485).\n- netvsc: do not overload variable in same function (fate#320485).\n- netvsc: do not print pointer value in error message (fate#320485).\n- netvsc: eliminate unnecessary skb == NULL checks (fate#320485).\n- netvsc: enable GRO (fate#320485).\n- netvsc: Fix a bug in sub-channel handling (fate#320485).\n- netvsc: fix and cleanup rndis_filter_set_packet_filter (fate#320485).\n- netvsc: fix calculation of available send sections (fate#320485).\n- netvsc: fix dereference before null check errors (fate#320485).\n- netvsc: fix error unwind on device setup failure (fate#320485).\n- netvsc: fix hang on netvsc module removal (fate#320485).\n- netvsc: fix NAPI performance regression (fate#320485).\n- netvsc: fix net poll mode (fate#320485).\n- netvsc: fix netvsc_set_channels (fate#320485).\n- netvsc: fix ptr_ret.cocci warnings (fate#320485).\n- netvsc: fix rcu dereference warning from ethtool (fate#320485).\n- netvsc: fix RCU warning in get_stats (fate#320485).\n- netvsc: fix return value for set_channels (fate#320485).\n- netvsc: fix rtnl deadlock on unregister of vf (fate#320485, bsc#1052442).\n- netvsc: fix use after free on module removal (fate#320485).\n- netvsc: fix warnings reported by lockdep (fate#320485).\n- netvsc: fold in get_outbound_net_device (fate#320485).\n- netvsc: force link update after MTU change (fate#320485).\n- netvsc: handle offline mtu and channel change (fate#320485).\n- netvsc: implement NAPI (fate#320485).\n- netvsc: include rtnetlink.h (fate#320485).\n- netvsc: Initialize all channel related state prior to opening the channel (fate#320485).\n- netvsc: make sure and unregister datapath (fate#320485, bsc#1052899).\n- netvsc: make sure napi enabled before vmbus_open (fate#320485).\n- netvsc: mark error cases as unlikely (fate#320485).\n- netvsc: move filter setting to rndis_device (fate#320485).\n- netvsc: need napi scheduled during removal (fate#320485).\n- netvsc: need rcu_derefence when accessing internal device info (fate#320485).\n- netvsc: optimize calculation of number of slots (fate#320485).\n- netvsc: optimize receive completions (fate#320485).\n- netvsc: pass net_device to netvsc_init_buf and netvsc_connect_vsp (fate#320485).\n- netvsc: prefetch the first incoming ring element (fate#320485).\n- netvsc: Properly initialize the return value (fate#320485).\n- netvsc: remove bogus rtnl_unlock (fate#320485).\n- netvsc: remove no longer used max_num_rss queues (fate#320485).\n- netvsc: Remove redundant use of ipv6_hdr() (fate#320485).\n- netvsc: remove unnecessary indirection of page_buffer (fate#320485).\n- netvsc: remove unnecessary lock on shutdown (fate#320485).\n- netvsc: remove unused #define (fate#320485).\n- netvsc: replace netdev_alloc_skb_ip_align with napi_alloc_skb (fate#320485).\n- netvsc: save pointer to parent netvsc_device in channel table (fate#320485).\n- netvsc: signal host if receive ring is emptied (fate#320485).\n- netvsc: transparent VF management (fate#320485, bsc#1051979).\n- netvsc: use ERR_PTR to avoid dereference issues (fate#320485).\n- netvsc: use hv_get_bytes_to_read (fate#320485).\n- netvsc: use napi_consume_skb (fate#320485).\n- netvsc: use RCU to protect inner device structure (fate#320485).\n- netvsc: uses RCU instead of removal flag (fate#320485).\n- netvsc: use typed pointer for internal state (fate#320485).\n- nfs: Cache aggressively when file is open for writing (bsc#1033587).\n- nfs: Do not flush caches for a getattr that races with writeback (bsc#1033587).\n- nfs: invalidate file size when taking a lock (git-fixes).\n- nfs: only invalidate dentrys that are clearly invalid (bsc#1047118).\n- nfs: Optimize fallocate by refreshing mapping when needed (git-fixes).\n- nvme: add hostid token to fabric options (bsc#1045293).\n- nvme: also provide a UUID in the WWID sysfs attribute (bsc#1048146).\n- nvme: fabrics commands should use the fctype field for data direction (bsc#1043805).\n- nvme-pci: fix CMB sysfs file removal in reset path (bsc#1050211).\n- nvme/pci: Fix stuck nvme reset (bsc#1043805).\n- nvmet: identify controller: improve standard compliance (bsc#1048146).\n- nvme: wwid_show: strip trailing 0-bytes (bsc#1048146).\n- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).\n- ocfs2: fix deadlock caused by recursive locking in xattr (bsc#1012829).\n- ocfs2: Make ocfs2_set_acl() static (bsc#1030552).\n- pci: Add Mellanox device IDs (bsc#1051478).\n- pci: Convert Mellanox broken INTx quirks to be for listed devices only (bsc#1051478).\n- pci: Correct PCI_STD_RESOURCE_END usage (bsc#1051478).\n- pci: dwc: dra7xx: Use RW1C for IRQSTATUS_MSI and IRQSTATUS_MAIN (bsc#1051478).\n- pci: dwc: Fix uninitialized variable in dw_handle_msi_irq() (bsc#1051478).\n- pci: Enable ECRC only if device supports it (bsc#1051478).\n- pci: hv: Allocate interrupt descriptors with GFP_ATOMIC (fate#320295, bnc#1034113).\n- pci: hv: Lock PCI bus on device eject (fate#320295, bnc#1034113). Replaces a change for (bnc#998664)\n- pci/msi: fix the pci_alloc_irq_vectors_affinity stub (bsc#1050211).\n- pci/msi: Ignore affinity if pre/post vector count is more than min_vecs (1050211).\n- pci/pm: Fix native PME handling during system suspend/resume (bsc#1051478).\n- pci: Support INTx masking on ConnectX-4 with firmware x.14.1100+ (bsc#1051478).\n- perf/x86: Fix spurious NMI with PEBS Load Latency event (bsc#1051478).\n- perf/x86/intel: Cure bogus unwind from PEBS entries (bsc#1051478).\n- perf/x86/intel: Fix PEBSv3 record drain (bsc#1051478).\n- pipe: cap initial pipe capacity according to pipe-max-size limit (bsc#1045330).\n- platform/x86: ideapad-laptop: Add IdeaPad 310-15IKB to no_hw_rfkill (bsc#1051022).\n- platform/x86: ideapad-laptop: Add IdeaPad V310-15ISK to no_hw_rfkill (bsc#1051022).\n- platform/x86: ideapad-laptop: Add IdeaPad V510-15IKB to no_hw_rfkill (bsc#1051022).\n- platform/x86: ideapad-laptop: Add Lenovo Yoga 910-13IKB to no_hw_rfkill dmi list (bsc#1051022).\n- platform/x86: ideapad-laptop: Add several models to no_hw_rfkill (bsc#1051022).\n- platform/x86: ideapad-laptop: Add Y520-15IKBN to no_hw_rfkill (bsc#1051022).\n- platform/x86: ideapad-laptop: Add Y700 15-ACZ to no_hw_rfkill DMI list (bsc#1051022).\n- platform/x86: ideapad-laptop: Add Y720-15IKBN to no_hw_rfkill (bsc#1051022).\n- pm / Hibernate: Fix scheduling while atomic during hibernation (bsc#1051059).\n- powerpc: Add POWER9 architected mode to cputable (bsc#1048916, fate#321439).\n- powerpc/fadump: Add a warning when \u0027fadump_reserve_mem=\u0027 is used (bsc#1049231).\n- powerpc/ftrace: Pass the correct stack pointer for DYNAMIC_FTRACE_WITH_REGS (FATE#322421).\n- powerpc/perf: Fix branch event code for power9 (fate#321438, Pending SUSE Kernel Fixes).\n- powerpc/perf: Fix oops when kthread execs user process\n- powerpc/perf: Fix SDAR_MODE value for continous sampling on Power9 (bsc#1053043 (git-fixes)).\n- powerpc: Support POWER9 in architected mode (bsc#1048916, fate#321439).\n- powerpc/tm: Fix saving of TM SPRs in core dump (fate#318470, git-fixes 08e1c01d6aed).\n- prctl: propagate has_child_subreaper flag to every descendant (bnc#1022476).\n- printk: Correctly handle preemption in console_unlock() (bsc#1046434).\n- printk/xen: Force printk sync mode when migrating Xen guest (bsc#1043347).\n- qed: Add missing static/local dcbx info (bsc#1019695).\n- qed: Correct print in iscsi error-flow (bsc#1019695).\n- qeth: fix L3 next-hop im xmit qeth hdr (bnc#1052773, LTC#157374).\n- rbd: drop extra rbd_img_request_get (bsc#1045596).\n- rbd: make sure pages are freed by libceph (bsc#1045596).\n- rdma/bnxt_re: checking for NULL instead of IS_ERR() (bsc#1052925).\n- rdma/iw_cxgb4: Always wake up waiter in c4iw_peer_abort_intr() (bsc#1026570).\n- rdma/mlx5: Fix existence check for extended address vector (bsc#1015342).\n- rdma/qedr: Prevent memory overrun in verbs\u0027 user responses (bsc#1022604 FATE#321747).\n- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).\n- Remove upstream commit e14b4db7a567 netvsc: fix race during initialization will be replaced by following changes\n- reorder upstream commit d0c2c9973ecd net: use core MTU range checking in virt drivers\n- Revert \u0027ACPI / video: Add force_native quirk for HP Pavilion dv6\u0027 (bsc#1031717).\n- Revert \u0027Add \u0027shutdown\u0027 to \u0027struct class\u0027.\u0027 (kabi).\n- Revert \u0027KVM: x86: fix emulation of RSM and IRET instructions\u0027 (kabi).\n- Revert \u0027Make file credentials available to the seqfile interfaces\u0027 (kabi).\n- Revert \u0027mm/list_lru.c: fix list_lru_count_node() to be race free\u0027 (kabi).\n- Revert \u0027netvsc: optimize calculation of number of slots\u0027 (fate#320485).\n- Revert \u0027powerpc/numa: Fix percpu allocations to be NUMA aware\u0027 (bsc#1048914).\n- Revert \u0027powerpc/numa: Fix percpu allocations to be NUMA aware\u0027 (bsc#1048914).\n- Revert \u0027/proc/iomem: only expose physical resource addresses to privileged users\u0027 (kabi).\n- Revert \u0027tpm: Issue a TPM2_Shutdown for TPM2 devices.\u0027 (kabi).\n- rpm/kernel-binary.spec.in: find-debuginfo.sh should not touch build-id This needs rpm-4.14+ (bsc#964063).\n- s390/crash: Remove unused KEXEC_NOTE_BYTES (bsc#1049706).\n- s390/kdump: remove code to create ELF notes in the crashed system (bsc#1049706).\n- sched/core: Allow __sched_setscheduler() in interrupts when PI is not used (bnc#1022476).\n- sched/debug: Print the scheduler topology group mask (bnc#1022476).\n- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1022476).\n- sched/fair: Fix O(nr_cgroups) in load balance path (bnc#1022476).\n- sched/fair: Use task_groups instead of leaf_cfs_rq_list to walk all cfs_rqs (bnc#1022476).\n- sched/topology: Add sched_group_capacity debugging (bnc#1022476).\n- sched/topology: Fix building of overlapping sched-groups (bnc#1022476).\n- sched/topology: Fix overlapping sched_group_capacity (bnc#1022476).\n- sched/topology: Move comment about asymmetric node setups (bnc#1022476).\n- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1022476).\n- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1022476).\n- sched/topology: Simplify build_overlap_sched_groups() (bnc#1022476).\n- sched/topology: Small cleanup (bnc#1022476).\n- sched/topology: Verify the first group matches the child domain (bnc#1022476).\n- scsi: aacraid: Do not copy uninitialized stack memory to userspace (bsc#1048912).\n- scsi: aacraid: fix leak of data from stack back to userspace (bsc#1048912).\n- scsi: aacraid: fix PCI error recovery path (bsc#1048912).\n- scsi: Add STARGET_CREATE_REMOVE state to scsi_target_state (bsc#1013887).\n- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).\n- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).\n- scsi_devinfo: fixup string compare (bsc#1037404).\n- scsi_dh_alua: suppress errors from unsupported devices (bsc#1038792).\n- scsi: hisi_sas: add pci_dev in hisi_hba struct (bsc#1049298).\n- scsi: hisi_sas: add v2 hw internal abort timeout workaround (bsc#1049298).\n- scsi: hisi_sas: controller reset for multi-bits ECC and AXI fatal errors (bsc#1049298).\n- scsi: hisi_sas: fix NULL deference when TMF timeouts (bsc#1049298).\n- scsi: hisi_sas: fix timeout check in hisi_sas_internal_task_abort() (bsc#1049298).\n- scsi: hisi_sas: optimise DMA slot memory (bsc#1049298).\n- scsi: hisi_sas: optimise the usage of hisi_hba.lock (bsc#1049298).\n- scsi: hisi_sas: relocate get_ata_protocol() (bsc#1049298).\n- scsi: hisi_sas: workaround a SoC SATA IO processing bug (bsc#1049298).\n- scsi: hisi_sas: workaround SoC about abort timeout bug (bsc#1049298).\n- scsi: hisi_sas: workaround STP link SoC bug (bsc#1049298).\n- scsi: kABI fix for new state STARGET_CREATED_REMOVE (bsc#1013887).\n- scsi: lpfc: Add auto EQ delay logic (bsc#1042257).\n- scsi: lpfc: Added recovery logic for running out of NVMET IO context resources (bsc#1037838).\n- scsi: lpfc: Adding additional stats counters for nvme (bsc#1037838).\n- scsi: lpfc: Add MDS Diagnostic support (bsc#1037838).\n- scsi: lpfc: Cleanup entry_repost settings on SLI4 queues (bsc#1037838).\n- scsi: lpfc: do not double count abort errors (bsc#1048912).\n- scsi: lpfc: Driver responds LS_RJT to Beacon Off ELS - Linux (bsc#1044623).\n- scsi: lpfc: Fix crash after firmware flash when IO is running (bsc#1044623).\n- scsi: lpfc: Fix crash doing IO with resets (bsc#1044623).\n- scsi: lpfc: Fix crash in lpfc_sli_ringtxcmpl_put when nvmet gets an abort request (bsc#1044623).\n- scsi: lpfc: Fix debugfs root inode \u0027lpfc\u0027 not getting deleted on driver unload (bsc#1037838).\n- scsi: lpfc: Fix defects reported by Coverity Scan (bsc#1042257).\n- scsi: lpfc: fix linking against modular NVMe support (bsc#1048912).\n- scsi: lpfc: Fix NMI watchdog assertions when running nvmet IOPS tests (bsc#1037838).\n- scsi: lpfc: Fix NVMEI driver not decrementing counter causing bad rport state (bsc#1037838).\n- scsi: lpfc: Fix nvme io stoppage after link bounce (bsc#1045404).\n- scsi: lpfc: Fix NVMEI\u0027s handling of NVMET\u0027s PRLI response attributes (bsc#1037838).\n- scsi: lpfc: Fix NVME I+T not registering NVME as a supported FC4 type (bsc#1037838).\n- scsi: lpfc: Fix nvmet RQ resource needs for large block writes (bsc#1037838).\n- scsi: lpfc: fix refcount error on node list (bsc#1045404).\n- scsi: lpfc: Fix SLI3 drivers attempting NVME ELS commands (bsc#1044623).\n- scsi: lpfc: Fix system crash when port is reset (bsc#1037838).\n- scsi: lpfc: Fix system panic when express lane enabled (bsc#1044623).\n- scsi: lpfc: Fix used-RPI accounting problem (bsc#1037838).\n- scsi: lpfc: Reduce time spent in IRQ for received NVME commands (bsc#1044623).\n- scsi: lpfc: Separate NVMET data buffer pool fir ELS/CT (bsc#1037838).\n- scsi: lpfc: Separate NVMET RQ buffer posting from IO resources SGL/iocbq/context (bsc#1037838).\n- scsi: lpfc: update to revision to 11.4.0.1 (bsc#1044623).\n- scsi: lpfc: update version to 11.2.0.14 (bsc#1037838).\n- scsi: lpfc: Vport creation is failing with \u0027Link Down\u0027 error (bsc#1044623).\n- scsi: qedf: Fix a return value in case of error in \u0027qedf_alloc_global_queues\u0027 (bsc#1048912).\n- scsi: qedi: Fix return code in qedi_ep_connect() (bsc#1048912).\n- scsi: qedi: Remove WARN_ON for untracked cleanup (bsc#1044443).\n- scsi: qedi: Remove WARN_ON from clear task context (bsc#1044443).\n- scsi: storvsc: Prefer kcalloc over kzalloc with multiply (fate#320485).\n- scsi: storvsc: remove return at end of void function (fate#320485).\n- scsi: storvsc: Workaround for virtual DVD SCSI version (fate#320485, bnc#1044636).\n- sfc: Add ethtool -m support for QSFP modules (bsc#1049619).\n- smartpqi: limit transfer length to 1MB (bsc#1025461).\n- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).\n- sr9700: use skb_cow_head() to deal with cloned skbs (bsc#1045154).\n- string.h: add memcpy_and_pad() (bsc#1048146).\n- sysctl: do not print negative flag for proc_douintvec (bnc#1046985).\n- Temporarily disable iwlwifi-expose-default-fallback-ucode-api ... for updating iwlwifi stack\n- timers: Plug locking race vs. timer migration (bnc#1022476).\n- tools: hv: Add clean up for included files in Ubuntu net config (fate#320485).\n- tools: hv: Add clean up function for Ubuntu config (fate#320485).\n- tools: hv: properly handle long paths (fate#320485).\n- tools: hv: set allow-hotplug for VF on Ubuntu (fate#320485).\n- tools: hv: set hotplug for VF on Suse (fate#320485).\n- Tools: hv: vss: Thaw the filesystem and continue if freeze call has timed out (fate#320485).\n- tpm: Issue a TPM2_Shutdown for TPM2 devices (bsc#1053117).\n- tpm: KABI fix (bsc#1053117).\n- tpm_tis: Fix IRQ autoprobing when using platform_device (bsc#1020645, fate#321435, fate#321507, fate#321600, Pending fixes 2017-07-06).\n- tpm_tis: Use platform_get_irq (bsc#1020645, fate#321435, fate#321507, fate#321600, Pending fixes 2017-07-06).\n- tpm/tpm_crb: fix priv-\u003ecmd_size initialisation (bsc#1020645, fate#321435, fate#321507, fate#321600, Pending SUSE Kernel Fixes).\n- udf: Fix deadlock between writeback and udf_setsize() (bsc#1012829).\n- udf: Fix races with i_size changes during readpage (bsc#1012829).\n- Update config files: add CONFIG_IWLWIFI_PCIE_RTPM=y (FATE#323335)\n- vfs: fix missing inode_get_dev sites (bsc#1052049).\n- vmbus: cleanup header file style (fate#320485).\n- vmbus: expose debug info for drivers (fate#320485).\n- vmbus: fix spelling errors (fate#320485).\n- vmbus: introduce in-place packet iterator (fate#320485).\n- vmbus: only reschedule tasklet if time limit exceeded (fate#320485).\n- vmbus: re-enable channel tasklet (fate#320485).\n- vmbus: remove unnecessary initialization (fate#320485).\n- vmbus: remove useless return\u0027s (fate#320485).\n- x86/dmi: Switch dmi_remap() from ioremap() to ioremap_cache() (bsc#1051399).\n- x86/hyperv: Check frequency MSRs presence according to the specification (fate#320485).\n- x86/LDT: Print the real LDT base address (bsc#1051478).\n- x86/mce: Make timer handling more robust (bsc#1042422).\n- x86/panic: replace smp_send_stop() with kdump friendly version in panic path (bsc#1051478).\n- x86/platform/uv/BAU: Disable BAU on single hub configurations (bsc#1050320).\n- x86/platform/uv/BAU: Fix congested_response_us not taking effect (bsc#1050322).\n- xen: allocate page for shared info page from low memory (bnc#1038616).\n- xen/balloon: do not online new memory initially (bnc#1028173).\n- xen: hold lock_device_hotplug throughout vcpu hotplug operations (bsc#1042422).\n- xen-netfront: Rework the fix for Rx stall during OOM and network stress (git-fixes).\n- xen/pvh*: Support \u003e 32 VCPUs at domain restore (bnc#1045563).\n- xfrm: NULL dereference on allocation failure (bsc#1047343).\n- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).\n- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).\n- xfs: detect and trim torn writes during log recovery (bsc#1036215).\n- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1050188).\n- xfs: Do not clear SGID when inheriting ACLs (bsc#1030552).\n- xfs: refactor and open code log record crc check (bsc#1036215).\n- xfs: refactor log record start detection into a new helper (bsc#1036215).\n- xfs: return start block of first bad log record during recovery (bsc#1036215).\n- xfs: support a crc verification only log record pass (bsc#1036215).\n- xgene: Do not fail probe, if there is no clk resource for SGMII interfaces (bsc#1048501).\n- xilinx network drivers: disable (bsc#1046170).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP3-2017-1404,SUSE-SLE-HA-12-SP3-2017-1404,SUSE-SLE-Live-Patching-12-SP3-2017-1404,SUSE-SLE-SDK-12-SP3-2017-1404,SUSE-SLE-SERVER-12-SP3-2017-1404,SUSE-SLE-WE-12-SP3-2017-1404",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2286-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:2286-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172286-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:2286-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003165.html"
},
{
"category": "self",
"summary": "SUSE Bug 1005778",
"url": "https://bugzilla.suse.com/1005778"
},
{
"category": "self",
"summary": "SUSE Bug 1006180",
"url": "https://bugzilla.suse.com/1006180"
},
{
"category": "self",
"summary": "SUSE Bug 1011913",
"url": "https://bugzilla.suse.com/1011913"
},
{
"category": "self",
"summary": "SUSE Bug 1012829",
"url": "https://bugzilla.suse.com/1012829"
},
{
"category": "self",
"summary": "SUSE Bug 1013887",
"url": "https://bugzilla.suse.com/1013887"
},
{
"category": "self",
"summary": "SUSE Bug 1015337",
"url": "https://bugzilla.suse.com/1015337"
},
{
"category": "self",
"summary": "SUSE Bug 1015342",
"url": "https://bugzilla.suse.com/1015342"
},
{
"category": "self",
"summary": "SUSE Bug 1016119",
"url": "https://bugzilla.suse.com/1016119"
},
{
"category": "self",
"summary": "SUSE Bug 1019151",
"url": "https://bugzilla.suse.com/1019151"
},
{
"category": "self",
"summary": "SUSE Bug 1019695",
"url": "https://bugzilla.suse.com/1019695"
},
{
"category": "self",
"summary": "SUSE Bug 1020645",
"url": "https://bugzilla.suse.com/1020645"
},
{
"category": "self",
"summary": "SUSE Bug 1022476",
"url": "https://bugzilla.suse.com/1022476"
},
{
"category": "self",
"summary": "SUSE Bug 1022600",
"url": "https://bugzilla.suse.com/1022600"
},
{
"category": "self",
"summary": "SUSE Bug 1022604",
"url": "https://bugzilla.suse.com/1022604"
},
{
"category": "self",
"summary": "SUSE Bug 1023175",
"url": "https://bugzilla.suse.com/1023175"
},
{
"category": "self",
"summary": "SUSE Bug 1024346",
"url": "https://bugzilla.suse.com/1024346"
},
{
"category": "self",
"summary": "SUSE Bug 1024373",
"url": "https://bugzilla.suse.com/1024373"
},
{
"category": "self",
"summary": "SUSE Bug 1025461",
"url": "https://bugzilla.suse.com/1025461"
},
{
"category": "self",
"summary": "SUSE Bug 1026570",
"url": "https://bugzilla.suse.com/1026570"
},
{
"category": "self",
"summary": "SUSE Bug 1028173",
"url": "https://bugzilla.suse.com/1028173"
},
{
"category": "self",
"summary": "SUSE Bug 1028286",
"url": "https://bugzilla.suse.com/1028286"
},
{
"category": "self",
"summary": "SUSE Bug 1029693",
"url": "https://bugzilla.suse.com/1029693"
},
{
"category": "self",
"summary": "SUSE Bug 1030552",
"url": "https://bugzilla.suse.com/1030552"
},
{
"category": "self",
"summary": "SUSE Bug 1031515",
"url": "https://bugzilla.suse.com/1031515"
},
{
"category": "self",
"summary": "SUSE Bug 1031717",
"url": "https://bugzilla.suse.com/1031717"
},
{
"category": "self",
"summary": "SUSE Bug 1031784",
"url": "https://bugzilla.suse.com/1031784"
},
{
"category": "self",
"summary": "SUSE Bug 1033587",
"url": "https://bugzilla.suse.com/1033587"
},
{
"category": "self",
"summary": "SUSE Bug 1034075",
"url": "https://bugzilla.suse.com/1034075"
},
{
"category": "self",
"summary": "SUSE Bug 1034113",
"url": "https://bugzilla.suse.com/1034113"
},
{
"category": "self",
"summary": "SUSE Bug 1034762",
"url": "https://bugzilla.suse.com/1034762"
},
{
"category": "self",
"summary": "SUSE Bug 1036215",
"url": "https://bugzilla.suse.com/1036215"
},
{
"category": "self",
"summary": "SUSE Bug 1036632",
"url": "https://bugzilla.suse.com/1036632"
},
{
"category": "self",
"summary": "SUSE Bug 1037344",
"url": "https://bugzilla.suse.com/1037344"
},
{
"category": "self",
"summary": "SUSE Bug 1037404",
"url": "https://bugzilla.suse.com/1037404"
},
{
"category": "self",
"summary": "SUSE Bug 1037838",
"url": "https://bugzilla.suse.com/1037838"
},
{
"category": "self",
"summary": "SUSE Bug 1037994",
"url": "https://bugzilla.suse.com/1037994"
},
{
"category": "self",
"summary": "SUSE Bug 1038078",
"url": "https://bugzilla.suse.com/1038078"
},
{
"category": "self",
"summary": "SUSE Bug 1038616",
"url": "https://bugzilla.suse.com/1038616"
},
{
"category": "self",
"summary": "SUSE Bug 1038792",
"url": "https://bugzilla.suse.com/1038792"
},
{
"category": "self",
"summary": "SUSE Bug 1039153",
"url": "https://bugzilla.suse.com/1039153"
},
{
"category": "self",
"summary": "SUSE Bug 1039348",
"url": "https://bugzilla.suse.com/1039348"
},
{
"category": "self",
"summary": "SUSE Bug 1039915",
"url": "https://bugzilla.suse.com/1039915"
},
{
"category": "self",
"summary": "SUSE Bug 1040307",
"url": "https://bugzilla.suse.com/1040307"
},
{
"category": "self",
"summary": "SUSE Bug 1040347",
"url": "https://bugzilla.suse.com/1040347"
},
{
"category": "self",
"summary": "SUSE Bug 1040351",
"url": "https://bugzilla.suse.com/1040351"
},
{
"category": "self",
"summary": "SUSE Bug 1041958",
"url": "https://bugzilla.suse.com/1041958"
},
{
"category": "self",
"summary": "SUSE Bug 1042257",
"url": "https://bugzilla.suse.com/1042257"
},
{
"category": "self",
"summary": "SUSE Bug 1042286",
"url": "https://bugzilla.suse.com/1042286"
},
{
"category": "self",
"summary": "SUSE Bug 1042314",
"url": "https://bugzilla.suse.com/1042314"
},
{
"category": "self",
"summary": "SUSE Bug 1042422",
"url": "https://bugzilla.suse.com/1042422"
},
{
"category": "self",
"summary": "SUSE Bug 1042778",
"url": "https://bugzilla.suse.com/1042778"
},
{
"category": "self",
"summary": "SUSE Bug 1043261",
"url": "https://bugzilla.suse.com/1043261"
},
{
"category": "self",
"summary": "SUSE Bug 1043347",
"url": "https://bugzilla.suse.com/1043347"
},
{
"category": "self",
"summary": "SUSE Bug 1043520",
"url": "https://bugzilla.suse.com/1043520"
},
{
"category": "self",
"summary": "SUSE Bug 1043598",
"url": "https://bugzilla.suse.com/1043598"
},
{
"category": "self",
"summary": "SUSE Bug 1043652",
"url": "https://bugzilla.suse.com/1043652"
},
{
"category": "self",
"summary": "SUSE Bug 1043805",
"url": "https://bugzilla.suse.com/1043805"
},
{
"category": "self",
"summary": "SUSE Bug 1043912",
"url": "https://bugzilla.suse.com/1043912"
},
{
"category": "self",
"summary": "SUSE Bug 1044112",
"url": "https://bugzilla.suse.com/1044112"
},
{
"category": "self",
"summary": "SUSE Bug 1044443",
"url": "https://bugzilla.suse.com/1044443"
},
{
"category": "self",
"summary": "SUSE Bug 1044623",
"url": "https://bugzilla.suse.com/1044623"
},
{
"category": "self",
"summary": "SUSE Bug 1044636",
"url": "https://bugzilla.suse.com/1044636"
},
{
"category": "self",
"summary": "SUSE Bug 1045154",
"url": "https://bugzilla.suse.com/1045154"
},
{
"category": "self",
"summary": "SUSE Bug 1045293",
"url": "https://bugzilla.suse.com/1045293"
},
{
"category": "self",
"summary": "SUSE Bug 1045330",
"url": "https://bugzilla.suse.com/1045330"
},
{
"category": "self",
"summary": "SUSE Bug 1045404",
"url": "https://bugzilla.suse.com/1045404"
},
{
"category": "self",
"summary": "SUSE Bug 1045563",
"url": "https://bugzilla.suse.com/1045563"
},
{
"category": "self",
"summary": "SUSE Bug 1045596",
"url": "https://bugzilla.suse.com/1045596"
},
{
"category": "self",
"summary": "SUSE Bug 1045709",
"url": "https://bugzilla.suse.com/1045709"
},
{
"category": "self",
"summary": "SUSE Bug 1045715",
"url": "https://bugzilla.suse.com/1045715"
},
{
"category": "self",
"summary": "SUSE Bug 1045866",
"url": "https://bugzilla.suse.com/1045866"
},
{
"category": "self",
"summary": "SUSE Bug 1045922",
"url": "https://bugzilla.suse.com/1045922"
},
{
"category": "self",
"summary": "SUSE Bug 1045937",
"url": "https://bugzilla.suse.com/1045937"
},
{
"category": "self",
"summary": "SUSE Bug 1046105",
"url": "https://bugzilla.suse.com/1046105"
},
{
"category": "self",
"summary": "SUSE Bug 1046170",
"url": "https://bugzilla.suse.com/1046170"
},
{
"category": "self",
"summary": "SUSE Bug 1046434",
"url": "https://bugzilla.suse.com/1046434"
},
{
"category": "self",
"summary": "SUSE Bug 1046651",
"url": "https://bugzilla.suse.com/1046651"
},
{
"category": "self",
"summary": "SUSE Bug 1046655",
"url": "https://bugzilla.suse.com/1046655"
},
{
"category": "self",
"summary": "SUSE Bug 1046682",
"url": "https://bugzilla.suse.com/1046682"
},
{
"category": "self",
"summary": "SUSE Bug 1046821",
"url": "https://bugzilla.suse.com/1046821"
},
{
"category": "self",
"summary": "SUSE Bug 1046985",
"url": "https://bugzilla.suse.com/1046985"
},
{
"category": "self",
"summary": "SUSE Bug 1047027",
"url": "https://bugzilla.suse.com/1047027"
},
{
"category": "self",
"summary": "SUSE Bug 1047048",
"url": "https://bugzilla.suse.com/1047048"
},
{
"category": "self",
"summary": "SUSE Bug 1047096",
"url": "https://bugzilla.suse.com/1047096"
},
{
"category": "self",
"summary": "SUSE Bug 1047118",
"url": "https://bugzilla.suse.com/1047118"
},
{
"category": "self",
"summary": "SUSE Bug 1047121",
"url": "https://bugzilla.suse.com/1047121"
},
{
"category": "self",
"summary": "SUSE Bug 1047152",
"url": "https://bugzilla.suse.com/1047152"
},
{
"category": "self",
"summary": "SUSE Bug 1047174",
"url": "https://bugzilla.suse.com/1047174"
},
{
"category": "self",
"summary": "SUSE Bug 1047277",
"url": "https://bugzilla.suse.com/1047277"
},
{
"category": "self",
"summary": "SUSE Bug 1047343",
"url": "https://bugzilla.suse.com/1047343"
},
{
"category": "self",
"summary": "SUSE Bug 1047354",
"url": "https://bugzilla.suse.com/1047354"
},
{
"category": "self",
"summary": "SUSE Bug 1047418",
"url": "https://bugzilla.suse.com/1047418"
},
{
"category": "self",
"summary": "SUSE Bug 1047506",
"url": "https://bugzilla.suse.com/1047506"
},
{
"category": "self",
"summary": "SUSE Bug 1047595",
"url": "https://bugzilla.suse.com/1047595"
},
{
"category": "self",
"summary": "SUSE Bug 1047651",
"url": "https://bugzilla.suse.com/1047651"
},
{
"category": "self",
"summary": "SUSE Bug 1047653",
"url": "https://bugzilla.suse.com/1047653"
},
{
"category": "self",
"summary": "SUSE Bug 1047670",
"url": "https://bugzilla.suse.com/1047670"
},
{
"category": "self",
"summary": "SUSE Bug 1047802",
"url": "https://bugzilla.suse.com/1047802"
},
{
"category": "self",
"summary": "SUSE Bug 1048146",
"url": "https://bugzilla.suse.com/1048146"
},
{
"category": "self",
"summary": "SUSE Bug 1048155",
"url": "https://bugzilla.suse.com/1048155"
},
{
"category": "self",
"summary": "SUSE Bug 1048221",
"url": "https://bugzilla.suse.com/1048221"
},
{
"category": "self",
"summary": "SUSE Bug 1048317",
"url": "https://bugzilla.suse.com/1048317"
},
{
"category": "self",
"summary": "SUSE Bug 1048348",
"url": "https://bugzilla.suse.com/1048348"
},
{
"category": "self",
"summary": "SUSE Bug 1048356",
"url": "https://bugzilla.suse.com/1048356"
},
{
"category": "self",
"summary": "SUSE Bug 1048421",
"url": "https://bugzilla.suse.com/1048421"
},
{
"category": "self",
"summary": "SUSE Bug 1048451",
"url": "https://bugzilla.suse.com/1048451"
},
{
"category": "self",
"summary": "SUSE Bug 1048501",
"url": "https://bugzilla.suse.com/1048501"
},
{
"category": "self",
"summary": "SUSE Bug 1048891",
"url": "https://bugzilla.suse.com/1048891"
},
{
"category": "self",
"summary": "SUSE Bug 1048912",
"url": "https://bugzilla.suse.com/1048912"
},
{
"category": "self",
"summary": "SUSE Bug 1048914",
"url": "https://bugzilla.suse.com/1048914"
},
{
"category": "self",
"summary": "SUSE Bug 1048916",
"url": "https://bugzilla.suse.com/1048916"
},
{
"category": "self",
"summary": "SUSE Bug 1048919",
"url": "https://bugzilla.suse.com/1048919"
},
{
"category": "self",
"summary": "SUSE Bug 1049231",
"url": "https://bugzilla.suse.com/1049231"
},
{
"category": "self",
"summary": "SUSE Bug 1049289",
"url": "https://bugzilla.suse.com/1049289"
},
{
"category": "self",
"summary": "SUSE Bug 1049298",
"url": "https://bugzilla.suse.com/1049298"
},
{
"category": "self",
"summary": "SUSE Bug 1049361",
"url": "https://bugzilla.suse.com/1049361"
},
{
"category": "self",
"summary": "SUSE Bug 1049483",
"url": "https://bugzilla.suse.com/1049483"
},
{
"category": "self",
"summary": "SUSE Bug 1049486",
"url": "https://bugzilla.suse.com/1049486"
},
{
"category": "self",
"summary": "SUSE Bug 1049603",
"url": "https://bugzilla.suse.com/1049603"
},
{
"category": "self",
"summary": "SUSE Bug 1049619",
"url": "https://bugzilla.suse.com/1049619"
},
{
"category": "self",
"summary": "SUSE Bug 1049645",
"url": "https://bugzilla.suse.com/1049645"
},
{
"category": "self",
"summary": "SUSE Bug 1049706",
"url": "https://bugzilla.suse.com/1049706"
},
{
"category": "self",
"summary": "SUSE Bug 1049882",
"url": "https://bugzilla.suse.com/1049882"
},
{
"category": "self",
"summary": "SUSE Bug 1050061",
"url": "https://bugzilla.suse.com/1050061"
},
{
"category": "self",
"summary": "SUSE Bug 1050188",
"url": "https://bugzilla.suse.com/1050188"
},
{
"category": "self",
"summary": "SUSE Bug 1050211",
"url": "https://bugzilla.suse.com/1050211"
},
{
"category": "self",
"summary": "SUSE Bug 1050320",
"url": "https://bugzilla.suse.com/1050320"
},
{
"category": "self",
"summary": "SUSE Bug 1050322",
"url": "https://bugzilla.suse.com/1050322"
},
{
"category": "self",
"summary": "SUSE Bug 1050677",
"url": "https://bugzilla.suse.com/1050677"
},
{
"category": "self",
"summary": "SUSE Bug 1051022",
"url": "https://bugzilla.suse.com/1051022"
},
{
"category": "self",
"summary": "SUSE Bug 1051048",
"url": "https://bugzilla.suse.com/1051048"
},
{
"category": "self",
"summary": "SUSE Bug 1051059",
"url": "https://bugzilla.suse.com/1051059"
},
{
"category": "self",
"summary": "SUSE Bug 1051239",
"url": "https://bugzilla.suse.com/1051239"
},
{
"category": "self",
"summary": "SUSE Bug 1051399",
"url": "https://bugzilla.suse.com/1051399"
},
{
"category": "self",
"summary": "SUSE Bug 1051471",
"url": "https://bugzilla.suse.com/1051471"
},
{
"category": "self",
"summary": "SUSE Bug 1051478",
"url": "https://bugzilla.suse.com/1051478"
},
{
"category": "self",
"summary": "SUSE Bug 1051479",
"url": "https://bugzilla.suse.com/1051479"
},
{
"category": "self",
"summary": "SUSE Bug 1051556",
"url": "https://bugzilla.suse.com/1051556"
},
{
"category": "self",
"summary": "SUSE Bug 1051663",
"url": "https://bugzilla.suse.com/1051663"
},
{
"category": "self",
"summary": "SUSE Bug 1051689",
"url": "https://bugzilla.suse.com/1051689"
},
{
"category": "self",
"summary": "SUSE Bug 1051979",
"url": "https://bugzilla.suse.com/1051979"
},
{
"category": "self",
"summary": "SUSE Bug 1052049",
"url": "https://bugzilla.suse.com/1052049"
},
{
"category": "self",
"summary": "SUSE Bug 1052223",
"url": "https://bugzilla.suse.com/1052223"
},
{
"category": "self",
"summary": "SUSE Bug 1052311",
"url": "https://bugzilla.suse.com/1052311"
},
{
"category": "self",
"summary": "SUSE Bug 1052325",
"url": "https://bugzilla.suse.com/1052325"
},
{
"category": "self",
"summary": "SUSE Bug 1052365",
"url": "https://bugzilla.suse.com/1052365"
},
{
"category": "self",
"summary": "SUSE Bug 1052442",
"url": "https://bugzilla.suse.com/1052442"
},
{
"category": "self",
"summary": "SUSE Bug 1052533",
"url": "https://bugzilla.suse.com/1052533"
},
{
"category": "self",
"summary": "SUSE Bug 1052709",
"url": "https://bugzilla.suse.com/1052709"
},
{
"category": "self",
"summary": "SUSE Bug 1052773",
"url": "https://bugzilla.suse.com/1052773"
},
{
"category": "self",
"summary": "SUSE Bug 1052794",
"url": "https://bugzilla.suse.com/1052794"
},
{
"category": "self",
"summary": "SUSE Bug 1052899",
"url": "https://bugzilla.suse.com/1052899"
},
{
"category": "self",
"summary": "SUSE Bug 1052925",
"url": "https://bugzilla.suse.com/1052925"
},
{
"category": "self",
"summary": "SUSE Bug 1053043",
"url": "https://bugzilla.suse.com/1053043"
},
{
"category": "self",
"summary": "SUSE Bug 1053117",
"url": "https://bugzilla.suse.com/1053117"
},
{
"category": "self",
"summary": "SUSE Bug 964063",
"url": "https://bugzilla.suse.com/964063"
},
{
"category": "self",
"summary": "SUSE Bug 974215",
"url": "https://bugzilla.suse.com/974215"
},
{
"category": "self",
"summary": "SUSE Bug 998664",
"url": "https://bugzilla.suse.com/998664"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000111 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000112 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10810 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11473 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11473/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7533 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7533/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7541 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7542 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8831 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8831/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2017-08-29T11:15:22Z",
"generator": {
"date": "2017-08-29T11:15:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:2286-1",
"initial_release_date": "2017-08-29T11:15:22Z",
"revision_history": [
{
"date": "2017-08-29T11:15:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-4.4.82-6.3.3.aarch64",
"product": {
"name": "kernel-obs-build-4.4.82-6.3.3.aarch64",
"product_id": "kernel-obs-build-4.4.82-6.3.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.82-6.3.1.aarch64",
"product": {
"name": "kernel-default-4.4.82-6.3.1.aarch64",
"product_id": "kernel-default-4.4.82-6.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.82-6.3.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.82-6.3.1.aarch64",
"product_id": "kernel-default-base-4.4.82-6.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.82-6.3.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.82-6.3.1.aarch64",
"product_id": "kernel-default-devel-4.4.82-6.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.82-6.3.1.aarch64",
"product": {
"name": "kernel-syms-4.4.82-6.3.1.aarch64",
"product_id": "kernel-syms-4.4.82-6.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.82-6.3.1.noarch",
"product": {
"name": "kernel-devel-4.4.82-6.3.1.noarch",
"product_id": "kernel-devel-4.4.82-6.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.82-6.3.1.noarch",
"product": {
"name": "kernel-macros-4.4.82-6.3.1.noarch",
"product_id": "kernel-macros-4.4.82-6.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.82-6.3.1.noarch",
"product": {
"name": "kernel-source-4.4.82-6.3.1.noarch",
"product_id": "kernel-source-4.4.82-6.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.82-6.3.5.noarch",
"product": {
"name": "kernel-docs-4.4.82-6.3.5.noarch",
"product_id": "kernel-docs-4.4.82-6.3.5.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.82-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.82-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.82-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.82-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.82-6.3.3.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.82-6.3.3.ppc64le",
"product_id": "kernel-obs-build-4.4.82-6.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.82-6.3.1.ppc64le",
"product": {
"name": "kernel-default-4.4.82-6.3.1.ppc64le",
"product_id": "kernel-default-4.4.82-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.82-6.3.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.82-6.3.1.ppc64le",
"product_id": "kernel-default-base-4.4.82-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.82-6.3.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.82-6.3.1.ppc64le",
"product_id": "kernel-default-devel-4.4.82-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.82-6.3.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.82-6.3.1.ppc64le",
"product_id": "kernel-syms-4.4.82-6.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.82-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.82-6.3.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.82-6.3.1.s390x",
"product_id": "dlm-kmp-default-4.4.82-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.82-6.3.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.82-6.3.1.s390x",
"product_id": "gfs2-kmp-default-4.4.82-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.82-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.82-6.3.3.s390x",
"product": {
"name": "kernel-obs-build-4.4.82-6.3.3.s390x",
"product_id": "kernel-obs-build-4.4.82-6.3.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.82-6.3.1.s390x",
"product": {
"name": "kernel-default-4.4.82-6.3.1.s390x",
"product_id": "kernel-default-4.4.82-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.82-6.3.1.s390x",
"product": {
"name": "kernel-default-base-4.4.82-6.3.1.s390x",
"product_id": "kernel-default-base-4.4.82-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.82-6.3.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.82-6.3.1.s390x",
"product_id": "kernel-default-devel-4.4.82-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.82-6.3.1.s390x",
"product": {
"name": "kernel-default-man-4.4.82-6.3.1.s390x",
"product_id": "kernel-default-man-4.4.82-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.82-6.3.1.s390x",
"product": {
"name": "kernel-syms-4.4.82-6.3.1.s390x",
"product_id": "kernel-syms-4.4.82-6.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.82-6.3.1.x86_64",
"product": {
"name": "kernel-default-4.4.82-6.3.1.x86_64",
"product_id": "kernel-default-4.4.82-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.82-6.3.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.82-6.3.1.x86_64",
"product_id": "kernel-default-devel-4.4.82-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.82-6.3.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.82-6.3.1.x86_64",
"product_id": "kernel-default-extra-4.4.82-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.82-6.3.1.x86_64",
"product": {
"name": "kernel-syms-4.4.82-6.3.1.x86_64",
"product_id": "kernel-syms-4.4.82-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.82-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.82-6.3.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.82-6.3.1.x86_64",
"product_id": "dlm-kmp-default-4.4.82-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.82-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.82-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"product_id": "kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.82-6.3.3.x86_64",
"product": {
"name": "kernel-obs-build-4.4.82-6.3.3.x86_64",
"product_id": "kernel-obs-build-4.4.82-6.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.82-6.3.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.82-6.3.1.x86_64",
"product_id": "kernel-default-base-4.4.82-6.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-default-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.82-6.3.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch"
},
"product_reference": "kernel-devel-4.4.82-6.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.82-6.3.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch"
},
"product_reference": "kernel-macros-4.4.82-6.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.82-6.3.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch"
},
"product_reference": "kernel-source-4.4.82-6.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-syms-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.82-6.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.82-6.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.82-6.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.82-6.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.4.82-6.3.5.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch"
},
"product_reference": "kernel-docs-4.4.82-6.3.5.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.82-6.3.3.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64"
},
"product_reference": "kernel-obs-build-4.4.82-6.3.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.82-6.3.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le"
},
"product_reference": "kernel-obs-build-4.4.82-6.3.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.82-6.3.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x"
},
"product_reference": "kernel-obs-build-4.4.82-6.3.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.82-6.3.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64"
},
"product_reference": "kernel-obs-build-4.4.82-6.3.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.82-6.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64"
},
"product_reference": "kernel-default-4.4.82-6.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.82-6.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le"
},
"product_reference": "kernel-default-4.4.82-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x"
},
"product_reference": "kernel-default-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-default-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.82-6.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.82-6.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.82-6.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.82-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x"
},
"product_reference": "kernel-default-base-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.82-6.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.82-6.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.82-6.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.82-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x"
},
"product_reference": "kernel-default-man-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.82-6.3.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch"
},
"product_reference": "kernel-devel-4.4.82-6.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.82-6.3.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch"
},
"product_reference": "kernel-macros-4.4.82-6.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.82-6.3.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch"
},
"product_reference": "kernel-source-4.4.82-6.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.82-6.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64"
},
"product_reference": "kernel-syms-4.4.82-6.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.82-6.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.82-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x"
},
"product_reference": "kernel-syms-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-syms-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.82-6.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64"
},
"product_reference": "kernel-default-4.4.82-6.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.82-6.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le"
},
"product_reference": "kernel-default-4.4.82-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x"
},
"product_reference": "kernel-default-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-default-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.82-6.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.82-6.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.82-6.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.82-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x"
},
"product_reference": "kernel-default-base-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.82-6.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.82-6.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.82-6.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.82-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x"
},
"product_reference": "kernel-default-man-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.82-6.3.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch"
},
"product_reference": "kernel-devel-4.4.82-6.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.82-6.3.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch"
},
"product_reference": "kernel-macros-4.4.82-6.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.82-6.3.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch"
},
"product_reference": "kernel-source-4.4.82-6.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.82-6.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64"
},
"product_reference": "kernel-syms-4.4.82-6.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.82-6.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.82-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.82-6.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x"
},
"product_reference": "kernel-syms-4.4.82-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-syms-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.82-6.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.82-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-1000111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000111"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000111",
"url": "https://www.suse.com/security/cve/CVE-2017-1000111"
},
{
"category": "external",
"summary": "SUSE Bug 1052365 for CVE-2017-1000111",
"url": "https://bugzilla.suse.com/1052365"
},
{
"category": "external",
"summary": "SUSE Bug 1052367 for CVE-2017-1000111",
"url": "https://bugzilla.suse.com/1052367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-29T11:15:22Z",
"details": "important"
}
],
"title": "CVE-2017-1000111"
},
{
"cve": "CVE-2017-1000112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000112"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb-\u003elen becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev-\u003elen - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 (\"[IPv4/IPv6]: UFO Scatter-gather approach\") on Oct 18 2005.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000112",
"url": "https://www.suse.com/security/cve/CVE-2017-1000112"
},
{
"category": "external",
"summary": "SUSE Bug 1052311 for CVE-2017-1000112",
"url": "https://bugzilla.suse.com/1052311"
},
{
"category": "external",
"summary": "SUSE Bug 1052365 for CVE-2017-1000112",
"url": "https://bugzilla.suse.com/1052365"
},
{
"category": "external",
"summary": "SUSE Bug 1052368 for CVE-2017-1000112",
"url": "https://bugzilla.suse.com/1052368"
},
{
"category": "external",
"summary": "SUSE Bug 1072117 for CVE-2017-1000112",
"url": "https://bugzilla.suse.com/1072117"
},
{
"category": "external",
"summary": "SUSE Bug 1072162 for CVE-2017-1000112",
"url": "https://bugzilla.suse.com/1072162"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-1000112",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-29T11:15:22Z",
"details": "important"
}
],
"title": "CVE-2017-1000112"
},
{
"cve": "CVE-2017-10810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10810"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10810",
"url": "https://www.suse.com/security/cve/CVE-2017-10810"
},
{
"category": "external",
"summary": "SUSE Bug 1047277 for CVE-2017-10810",
"url": "https://bugzilla.suse.com/1047277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-29T11:15:22Z",
"details": "moderate"
}
],
"title": "CVE-2017-10810"
},
{
"cve": "CVE-2017-11473",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11473"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11473",
"url": "https://www.suse.com/security/cve/CVE-2017-11473"
},
{
"category": "external",
"summary": "SUSE Bug 1049603 for CVE-2017-11473",
"url": "https://bugzilla.suse.com/1049603"
},
{
"category": "external",
"summary": "SUSE Bug 1061680 for CVE-2017-11473",
"url": "https://bugzilla.suse.com/1061680"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-11473",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-11473",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-29T11:15:22Z",
"details": "moderate"
}
],
"title": "CVE-2017-11473"
},
{
"cve": "CVE-2017-7533",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7533"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7533",
"url": "https://www.suse.com/security/cve/CVE-2017-7533"
},
{
"category": "external",
"summary": "SUSE Bug 1049483 for CVE-2017-7533",
"url": "https://bugzilla.suse.com/1049483"
},
{
"category": "external",
"summary": "SUSE Bug 1050677 for CVE-2017-7533",
"url": "https://bugzilla.suse.com/1050677"
},
{
"category": "external",
"summary": "SUSE Bug 1050751 for CVE-2017-7533",
"url": "https://bugzilla.suse.com/1050751"
},
{
"category": "external",
"summary": "SUSE Bug 1053919 for CVE-2017-7533",
"url": "https://bugzilla.suse.com/1053919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-29T11:15:22Z",
"details": "important"
}
],
"title": "CVE-2017-7533"
},
{
"cve": "CVE-2017-7541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7541"
}
],
"notes": [
{
"category": "general",
"text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7541",
"url": "https://www.suse.com/security/cve/CVE-2017-7541"
},
{
"category": "external",
"summary": "SUSE Bug 1049645 for CVE-2017-7541",
"url": "https://bugzilla.suse.com/1049645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-29T11:15:22Z",
"details": "moderate"
}
],
"title": "CVE-2017-7541"
},
{
"cve": "CVE-2017-7542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7542"
}
],
"notes": [
{
"category": "general",
"text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7542",
"url": "https://www.suse.com/security/cve/CVE-2017-7542"
},
{
"category": "external",
"summary": "SUSE Bug 1049882 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1049882"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1061936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-29T11:15:22Z",
"details": "moderate"
}
],
"title": "CVE-2017-7542"
},
{
"cve": "CVE-2017-8831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8831"
}
],
"notes": [
{
"category": "general",
"text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8831",
"url": "https://www.suse.com/security/cve/CVE-2017-8831"
},
{
"category": "external",
"summary": "SUSE Bug 1037994 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1037994"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1061936"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.82-6.3.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.82-6.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.82-6.3.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.82-6.3.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.82-6.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-29T11:15:22Z",
"details": "moderate"
}
],
"title": "CVE-2017-8831"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…