SUSE-SU-2017:2920-1

Vulnerability from csaf_suse - Published: 2017-11-02 13:02 - Updated: 2017-11-02 13:02
Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch: The SUSE Linux Enterprise 12 GA LTS kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346 (bnc#1064388). - CVE-2015-9004: kernel/events/core.c in the Linux kernel mishandled counter grouping, which allowed local users to gain privileges via a crafted application, related to the perf_pmu_register and perf_event_open functions (bnc#1037306). - CVE-2016-10229: udp.c in the Linux kernel allowed remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag (bnc#1032268). - CVE-2016-9604: The handling of keyrings starting with '.' in KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to manipulate privileged keyrings, was fixed (bsc#1035576) - CVE-2017-1000363: Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line (bnc#1039456). - CVE-2017-1000365: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation. (bnc#1039354). - CVE-2017-1000380: sound/core/timer.c in the Linux kernel is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time (bnc#1044125). - CVE-2017-10661: Race condition in fs/timerfd.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing (bnc#1053152). - CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1048275). - CVE-2017-12153: A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel This function did not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash (bnc#1058410). - CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel did not ensure that the 'CR8-load exiting' and 'CR8-store exiting' L0 vmcs02 controls exist in cases where L1 omits the 'use TPR shadow' vmcs12 control, which allowed KVM L2 guest OS users to obtain read and write access to the hardware CR8 register (bnc#1058507). - CVE-2017-12762: In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. (bnc#1053148). - CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1063667). - CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588). - CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982). - CVE-2017-14140: The move_pages system call in mm/migrate.c in the Linux kernel doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR (bnc#1057179). - CVE-2017-15265: Use-after-free vulnerability in the Linux kernel allowed local users to have unspecified impact via vectors related to /dev/snd/seq (bnc#1062520). - CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192 (bnc#1045327). - CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bnc#1030593). - CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type (bnc#1029850). - CVE-2017-7482: A potential memory corruption was fixed in decoding of krb5 principals in the kernels kerberos handling. (bnc#1046107). - CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879). - CVE-2017-7518: The Linux kernel was vulnerable to an incorrect debug exception(#DB) error. It could occur while emulating a syscall instruction and potentially lead to guest privilege escalation. (bsc#1045922). - CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet (bnc#1049645). - CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bnc#1049882). - CVE-2017-7889: The mm subsystem in the Linux kernel did not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allowed local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c (bnc#1034405). - CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 allowed privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer (bnc#1035877). - CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability (bnc#1037994). - CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544). - CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1037182 bsc#1038982). - CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1037183 bsc#1038981). - CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882). - CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883). - CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885). - CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069). - CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431). The following non-security bugs were fixed: - btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779, bsc#1008353, bsc#1017941). - dm-mpath: always return reservation conflict. bsc#938162 - getcwd: Close race with d_move called by lustre (bsc#1052593). - ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output (bsc#1041958). - ipv6: Should use consistent conditional judgement for ip6 fragment between __ip6_append_data and ip6_finish_output (bsc#1041958). - kabi: avoid bogus kabi errors in ip_output.c (bsc#1041958). - keys: Disallow keyrings beginning with '.' to be joined as session keyrings (bnc#1035576). - mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348). - net: account for current skb length when deciding about UFO (bsc#1041958). - nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670 CVE#2017-7645). - nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670 CVE#2017-7645). - nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670 CVE#2017-7645). - printk: prevent userland from spoofing kernel messages (bsc#1039721). - reiserfs: do not preallocate blocks for extended attributes (bsc#990682). - tcp: do not inherit fastopen_req from parent (bsc#1038544). - udp: disallow UFO for sockets with SO_NO_CHECK option (bsc#1041958). - usb: wusbcore: fix NULL-deref at probe (bsc#1045487). - vsock: Detach QP check should filter out non matching QPs (bsc#1036752 bsc#1047408). - vsock: Fix lockdep issue (bsc#977417 bsc#1047408). - vsock: sock_put wasn't safe to call in interrupt context (bsc#977417 bsc#1047408). - xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present (bsc#1058524).
Patchnames: SUSE-SLE-Module-Public-Cloud-12-2017-1808,SUSE-SLE-SERVER-12-2017-1808
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-security-upd… self
https://bugzilla.suse.com/1008353 self
https://bugzilla.suse.com/1012422 self
https://bugzilla.suse.com/1017941 self
https://bugzilla.suse.com/1029850 self
https://bugzilla.suse.com/1030593 self
https://bugzilla.suse.com/1032268 self
https://bugzilla.suse.com/1034405 self
https://bugzilla.suse.com/1034670 self
https://bugzilla.suse.com/1035576 self
https://bugzilla.suse.com/1035877 self
https://bugzilla.suse.com/1036752 self
https://bugzilla.suse.com/1037182 self
https://bugzilla.suse.com/1037183 self
https://bugzilla.suse.com/1037306 self
https://bugzilla.suse.com/1037994 self
https://bugzilla.suse.com/1038544 self
https://bugzilla.suse.com/1038879 self
https://bugzilla.suse.com/1038981 self
https://bugzilla.suse.com/1038982 self
https://bugzilla.suse.com/1039348 self
https://bugzilla.suse.com/1039349 self
https://bugzilla.suse.com/1039354 self
https://bugzilla.suse.com/1039456 self
https://bugzilla.suse.com/1039721 self
https://bugzilla.suse.com/1039882 self
https://bugzilla.suse.com/1039883 self
https://bugzilla.suse.com/1039885 self
https://bugzilla.suse.com/1040069 self
https://bugzilla.suse.com/1041431 self
https://bugzilla.suse.com/1041958 self
https://bugzilla.suse.com/1044125 self
https://bugzilla.suse.com/1045327 self
https://bugzilla.suse.com/1045487 self
https://bugzilla.suse.com/1045922 self
https://bugzilla.suse.com/1046107 self
https://bugzilla.suse.com/1047408 self
https://bugzilla.suse.com/1048275 self
https://bugzilla.suse.com/1049645 self
https://bugzilla.suse.com/1049882 self
https://bugzilla.suse.com/1052593 self
https://bugzilla.suse.com/1053148 self
https://bugzilla.suse.com/1053152 self
https://bugzilla.suse.com/1056588 self
https://bugzilla.suse.com/1056982 self
https://bugzilla.suse.com/1057179 self
https://bugzilla.suse.com/1058038 self
https://bugzilla.suse.com/1058410 self
https://bugzilla.suse.com/1058507 self
https://bugzilla.suse.com/1058524 self
https://bugzilla.suse.com/1062520 self
https://bugzilla.suse.com/1063667 self
https://bugzilla.suse.com/1064388 self
https://bugzilla.suse.com/938162 self
https://bugzilla.suse.com/975596 self
https://bugzilla.suse.com/977417 self
https://bugzilla.suse.com/984779 self
https://bugzilla.suse.com/985562 self
https://bugzilla.suse.com/990682 self
https://www.suse.com/security/cve/CVE-2015-9004/ self
https://www.suse.com/security/cve/CVE-2016-10229/ self
https://www.suse.com/security/cve/CVE-2016-9604/ self
https://www.suse.com/security/cve/CVE-2017-1000363/ self
https://www.suse.com/security/cve/CVE-2017-1000365/ self
https://www.suse.com/security/cve/CVE-2017-1000380/ self
https://www.suse.com/security/cve/CVE-2017-10661/ self
https://www.suse.com/security/cve/CVE-2017-11176/ self
https://www.suse.com/security/cve/CVE-2017-12153/ self
https://www.suse.com/security/cve/CVE-2017-12154/ self
https://www.suse.com/security/cve/CVE-2017-12762/ self
https://www.suse.com/security/cve/CVE-2017-13080/ self
https://www.suse.com/security/cve/CVE-2017-14051/ self
https://www.suse.com/security/cve/CVE-2017-14106/ self
https://www.suse.com/security/cve/CVE-2017-14140/ self
https://www.suse.com/security/cve/CVE-2017-15265/ self
https://www.suse.com/security/cve/CVE-2017-15274/ self
https://www.suse.com/security/cve/CVE-2017-15649/ self
https://www.suse.com/security/cve/CVE-2017-2647/ self
https://www.suse.com/security/cve/CVE-2017-6951/ self
https://www.suse.com/security/cve/CVE-2017-7482/ self
https://www.suse.com/security/cve/CVE-2017-7487/ self
https://www.suse.com/security/cve/CVE-2017-7518/ self
https://www.suse.com/security/cve/CVE-2017-7541/ self
https://www.suse.com/security/cve/CVE-2017-7542/ self
https://www.suse.com/security/cve/CVE-2017-7889/ self
https://www.suse.com/security/cve/CVE-2017-8106/ self
https://www.suse.com/security/cve/CVE-2017-8831/ self
https://www.suse.com/security/cve/CVE-2017-8890/ self
https://www.suse.com/security/cve/CVE-2017-8924/ self
https://www.suse.com/security/cve/CVE-2017-8925/ self
https://www.suse.com/security/cve/CVE-2017-9074/ self
https://www.suse.com/security/cve/CVE-2017-9075/ self
https://www.suse.com/security/cve/CVE-2017-9076/ self
https://www.suse.com/security/cve/CVE-2017-9077/ self
https://www.suse.com/security/cve/CVE-2017-9242/ self
https://www.suse.com/security/cve/CVE-2015-9004 external
https://bugzilla.suse.com/1037306 external
https://www.suse.com/security/cve/CVE-2016-10229 external
https://bugzilla.suse.com/1032268 external
https://www.suse.com/security/cve/CVE-2016-9604 external
https://bugzilla.suse.com/1035576 external
https://www.suse.com/security/cve/CVE-2017-1000363 external
https://bugzilla.suse.com/1039456 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-1000365 external
https://bugzilla.suse.com/1037551 external
https://bugzilla.suse.com/1039346 external
https://bugzilla.suse.com/1039349 external
https://bugzilla.suse.com/1039354 external
https://bugzilla.suse.com/1054557 external
https://bugzilla.suse.com/1077345 external
https://www.suse.com/security/cve/CVE-2017-1000380 external
https://bugzilla.suse.com/1044125 external
https://www.suse.com/security/cve/CVE-2017-10661 external
https://bugzilla.suse.com/1053152 external
https://bugzilla.suse.com/1053153 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-11176 external
https://bugzilla.suse.com/1048275 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-12153 external
https://bugzilla.suse.com/1058410 external
https://bugzilla.suse.com/1058624 external
https://www.suse.com/security/cve/CVE-2017-12154 external
https://bugzilla.suse.com/1058038 external
https://bugzilla.suse.com/1058507 external
https://www.suse.com/security/cve/CVE-2017-12762 external
https://bugzilla.suse.com/1053148 external
https://bugzilla.suse.com/1053150 external
https://bugzilla.suse.com/1072117 external
https://bugzilla.suse.com/1072162 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-13080 external
https://bugzilla.suse.com/1056061 external
https://bugzilla.suse.com/1063479 external
https://bugzilla.suse.com/1063667 external
https://bugzilla.suse.com/1063671 external
https://bugzilla.suse.com/1066295 external
https://bugzilla.suse.com/1105108 external
https://bugzilla.suse.com/1178872 external
https://bugzilla.suse.com/1179588 external
https://www.suse.com/security/cve/CVE-2017-14051 external
https://bugzilla.suse.com/1056588 external
https://www.suse.com/security/cve/CVE-2017-14106 external
https://bugzilla.suse.com/1056982 external
https://www.suse.com/security/cve/CVE-2017-14140 external
https://bugzilla.suse.com/1057179 external
https://www.suse.com/security/cve/CVE-2017-15265 external
https://bugzilla.suse.com/1062520 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-15274 external
https://bugzilla.suse.com/1045327 external
https://bugzilla.suse.com/1062471 external
https://www.suse.com/security/cve/CVE-2017-15649 external
https://bugzilla.suse.com/1064388 external
https://bugzilla.suse.com/1064392 external
https://bugzilla.suse.com/1087082 external
https://www.suse.com/security/cve/CVE-2017-2647 external
https://bugzilla.suse.com/1030593 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-6951 external
https://bugzilla.suse.com/1029850 external
https://bugzilla.suse.com/1030593 external
https://www.suse.com/security/cve/CVE-2017-7482 external
https://bugzilla.suse.com/1046107 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-7487 external
https://bugzilla.suse.com/1038879 external
https://bugzilla.suse.com/1038883 external
https://bugzilla.suse.com/1038981 external
https://bugzilla.suse.com/1038982 external
https://bugzilla.suse.com/1072204 external
https://bugzilla.suse.com/1115893 external
https://bugzilla.suse.com/870618 external
https://www.suse.com/security/cve/CVE-2017-7518 external
https://bugzilla.suse.com/1045922 external
https://bugzilla.suse.com/1087082 external
https://www.suse.com/security/cve/CVE-2017-7541 external
https://bugzilla.suse.com/1049645 external
https://www.suse.com/security/cve/CVE-2017-7542 external
https://bugzilla.suse.com/1049882 external
https://bugzilla.suse.com/1061936 external
https://www.suse.com/security/cve/CVE-2017-7889 external
https://bugzilla.suse.com/1034405 external
https://www.suse.com/security/cve/CVE-2017-8106 external
https://bugzilla.suse.com/1035877 external
https://www.suse.com/security/cve/CVE-2017-8831 external
https://bugzilla.suse.com/1037994 external
https://bugzilla.suse.com/1061936 external
https://bugzilla.suse.com/1087082 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-8890 external
https://bugzilla.suse.com/1038544 external
https://bugzilla.suse.com/1038564 external
https://bugzilla.suse.com/1039883 external
https://bugzilla.suse.com/1039885 external
https://bugzilla.suse.com/1040069 external
https://bugzilla.suse.com/1042364 external
https://bugzilla.suse.com/1051906 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-8924 external
https://bugzilla.suse.com/1037182 external
https://bugzilla.suse.com/1038981 external
https://bugzilla.suse.com/1038982 external
https://bugzilla.suse.com/870618 external
https://www.suse.com/security/cve/CVE-2017-8925 external
https://bugzilla.suse.com/1037183 external
https://bugzilla.suse.com/1038981 external
https://bugzilla.suse.com/1038982 external
https://bugzilla.suse.com/870618 external
https://www.suse.com/security/cve/CVE-2017-9074 external
https://bugzilla.suse.com/1039882 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-9075 external
https://bugzilla.suse.com/1038544 external
https://bugzilla.suse.com/1039883 external
https://bugzilla.suse.com/1051906 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-9076 external
https://bugzilla.suse.com/1038544 external
https://bugzilla.suse.com/1039885 external
https://bugzilla.suse.com/1040069 external
https://bugzilla.suse.com/1051906 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-9077 external
https://bugzilla.suse.com/1038544 external
https://bugzilla.suse.com/1040069 external
https://bugzilla.suse.com/1042364 external
https://bugzilla.suse.com/1115893 external
https://www.suse.com/security/cve/CVE-2017-9242 external
https://bugzilla.suse.com/1041431 external
https://bugzilla.suse.com/1042892 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\n\nThe SUSE Linux Enterprise 12 GA LTS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346 (bnc#1064388).\n- CVE-2015-9004: kernel/events/core.c in the Linux kernel mishandled counter grouping, which allowed local users to gain privileges via a crafted application, related to the perf_pmu_register and perf_event_open functions (bnc#1037306).\n- CVE-2016-10229: udp.c in the Linux kernel allowed remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag (bnc#1032268).\n- CVE-2016-9604: The handling of keyrings starting with \u0027.\u0027 in KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to manipulate privileged keyrings, was fixed (bsc#1035576)\n- CVE-2017-1000363: Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a \u0027secure boot\u0027 kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6\u0027s CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (\u003eLP_NO) \u0027lp=none\u0027 arguments to the command line (bnc#1039456).\n- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation. (bnc#1039354).\n- CVE-2017-1000380: sound/core/timer.c in the Linux kernel is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time (bnc#1044125).\n- CVE-2017-10661: Race condition in fs/timerfd.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing (bnc#1053152).\n- CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1048275).\n- CVE-2017-12153: A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel This function did not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash (bnc#1058410).\n- CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel did not ensure that the \u0027CR8-load exiting\u0027 and \u0027CR8-store exiting\u0027 L0 vmcs02 controls exist in cases where L1 omits the \u0027use TPR shadow\u0027 vmcs12 control, which allowed KVM L2 guest OS users to obtain read and write access to the hardware CR8 register (bnc#1058507).\n- CVE-2017-12762: In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. (bnc#1053148).\n- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1063667).\n- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588).\n- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).\n- CVE-2017-14140: The move_pages system call in mm/migrate.c in the Linux kernel doesn\u0027t check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR (bnc#1057179).\n- CVE-2017-15265: Use-after-free vulnerability in the Linux kernel allowed local users to have unspecified impact via vectors related to /dev/snd/seq (bnc#1062520).\n- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192 (bnc#1045327).\n- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bnc#1030593).\n- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the \u0027dead\u0027 type (bnc#1029850).\n- CVE-2017-7482: A potential memory corruption was fixed in decoding of krb5 principals in the kernels kerberos handling. (bnc#1046107).\n- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879).\n- CVE-2017-7518: The Linux kernel was vulnerable to an incorrect debug exception(#DB) error. It could occur while emulating a syscall instruction and potentially lead to guest privilege escalation. (bsc#1045922).\n- CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet (bnc#1049645).\n- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bnc#1049882).\n- CVE-2017-7889: The mm subsystem in the Linux kernel did not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allowed local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c (bnc#1034405).\n- CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 allowed privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer (bnc#1035877).\n- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \u0027double fetch\u0027 vulnerability (bnc#1037994).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544).\n- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1037182 bsc#1038982).\n- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1037183 bsc#1038981).\n- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882).\n- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883).\n- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431).\n\nThe following non-security bugs were fixed:\n\n- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779, bsc#1008353, bsc#1017941).\n- dm-mpath: always return reservation conflict. bsc#938162\n- getcwd: Close race with d_move called by lustre (bsc#1052593).\n- ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output (bsc#1041958).\n- ipv6: Should use consistent conditional judgement for ip6 fragment between __ip6_append_data and ip6_finish_output (bsc#1041958).\n- kabi: avoid bogus kabi errors in ip_output.c (bsc#1041958).\n- keys: Disallow keyrings beginning with \u0027.\u0027 to be joined as session keyrings (bnc#1035576).\n- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).\n- net: account for current skb length when deciding about UFO (bsc#1041958).\n- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670 CVE#2017-7645).\n- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670 CVE#2017-7645).\n- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670 CVE#2017-7645).\n- printk: prevent userland from spoofing kernel messages (bsc#1039721).\n- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).\n- tcp: do not inherit fastopen_req from parent (bsc#1038544).\n- udp: disallow UFO for sockets with SO_NO_CHECK option (bsc#1041958).\n- usb: wusbcore: fix NULL-deref at probe (bsc#1045487).\n- vsock: Detach QP check should filter out non matching QPs (bsc#1036752 bsc#1047408).\n- vsock: Fix lockdep issue (bsc#977417 bsc#1047408).\n- vsock: sock_put wasn\u0027t safe to call in interrupt context (bsc#977417 bsc#1047408).\n- xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present (bsc#1058524).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-Module-Public-Cloud-12-2017-1808,SUSE-SLE-SERVER-12-2017-1808",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2920-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2017:2920-1",
        "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172920-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2017:2920-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1008353",
        "url": "https://bugzilla.suse.com/1008353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1012422",
        "url": "https://bugzilla.suse.com/1012422"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1017941",
        "url": "https://bugzilla.suse.com/1017941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1029850",
        "url": "https://bugzilla.suse.com/1029850"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1030593",
        "url": "https://bugzilla.suse.com/1030593"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1032268",
        "url": "https://bugzilla.suse.com/1032268"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1034405",
        "url": "https://bugzilla.suse.com/1034405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1034670",
        "url": "https://bugzilla.suse.com/1034670"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1035576",
        "url": "https://bugzilla.suse.com/1035576"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1035877",
        "url": "https://bugzilla.suse.com/1035877"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1036752",
        "url": "https://bugzilla.suse.com/1036752"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1037182",
        "url": "https://bugzilla.suse.com/1037182"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1037183",
        "url": "https://bugzilla.suse.com/1037183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1037306",
        "url": "https://bugzilla.suse.com/1037306"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1037994",
        "url": "https://bugzilla.suse.com/1037994"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1038544",
        "url": "https://bugzilla.suse.com/1038544"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1038879",
        "url": "https://bugzilla.suse.com/1038879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1038981",
        "url": "https://bugzilla.suse.com/1038981"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1038982",
        "url": "https://bugzilla.suse.com/1038982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1039348",
        "url": "https://bugzilla.suse.com/1039348"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1039349",
        "url": "https://bugzilla.suse.com/1039349"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1039354",
        "url": "https://bugzilla.suse.com/1039354"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1039456",
        "url": "https://bugzilla.suse.com/1039456"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1039721",
        "url": "https://bugzilla.suse.com/1039721"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1039882",
        "url": "https://bugzilla.suse.com/1039882"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1039883",
        "url": "https://bugzilla.suse.com/1039883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1039885",
        "url": "https://bugzilla.suse.com/1039885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1040069",
        "url": "https://bugzilla.suse.com/1040069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1041431",
        "url": "https://bugzilla.suse.com/1041431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1041958",
        "url": "https://bugzilla.suse.com/1041958"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1044125",
        "url": "https://bugzilla.suse.com/1044125"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1045327",
        "url": "https://bugzilla.suse.com/1045327"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1045487",
        "url": "https://bugzilla.suse.com/1045487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1045922",
        "url": "https://bugzilla.suse.com/1045922"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1046107",
        "url": "https://bugzilla.suse.com/1046107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1047408",
        "url": "https://bugzilla.suse.com/1047408"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1048275",
        "url": "https://bugzilla.suse.com/1048275"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1049645",
        "url": "https://bugzilla.suse.com/1049645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1049882",
        "url": "https://bugzilla.suse.com/1049882"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1052593",
        "url": "https://bugzilla.suse.com/1052593"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1053148",
        "url": "https://bugzilla.suse.com/1053148"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1053152",
        "url": "https://bugzilla.suse.com/1053152"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1056588",
        "url": "https://bugzilla.suse.com/1056588"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1056982",
        "url": "https://bugzilla.suse.com/1056982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1057179",
        "url": "https://bugzilla.suse.com/1057179"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1058038",
        "url": "https://bugzilla.suse.com/1058038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1058410",
        "url": "https://bugzilla.suse.com/1058410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1058507",
        "url": "https://bugzilla.suse.com/1058507"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1058524",
        "url": "https://bugzilla.suse.com/1058524"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1062520",
        "url": "https://bugzilla.suse.com/1062520"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1063667",
        "url": "https://bugzilla.suse.com/1063667"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1064388",
        "url": "https://bugzilla.suse.com/1064388"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 938162",
        "url": "https://bugzilla.suse.com/938162"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 975596",
        "url": "https://bugzilla.suse.com/975596"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 977417",
        "url": "https://bugzilla.suse.com/977417"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 984779",
        "url": "https://bugzilla.suse.com/984779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 985562",
        "url": "https://bugzilla.suse.com/985562"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 990682",
        "url": "https://bugzilla.suse.com/990682"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-9004 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-9004/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-10229 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-10229/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-9604 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-9604/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-1000363 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-1000363/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-1000365 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-1000365/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-1000380 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-1000380/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-10661 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-10661/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-11176 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-11176/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-12153 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-12153/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-12154 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-12154/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-12762 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-12762/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-13080 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-13080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-14051 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-14051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-14106 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-14106/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-14140 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-14140/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-15265 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-15265/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-15274 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-15274/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-15649 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-15649/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-2647 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-2647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-6951 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-6951/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7482 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7482/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7487 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7487/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7518 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7518/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7541 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7541/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7542 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7542/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7889 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7889/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-8106 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-8106/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-8831 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-8831/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-8890 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-8890/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-8924 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-8924/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-8925 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-8925/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-9074 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-9074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-9075 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-9075/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-9076 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-9076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-9077 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-9077/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-9242 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-9242/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2017-11-02T13:02:36Z",
      "generator": {
        "date": "2017-11-02T13:02:36Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2017:2920-1",
      "initial_release_date": "2017-11-02T13:02:36Z",
      "revision_history": [
        {
          "date": "2017-11-02T13:02:36Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-3.12.61-52.101.1.noarch",
                "product": {
                  "name": "kernel-devel-3.12.61-52.101.1.noarch",
                  "product_id": "kernel-devel-3.12.61-52.101.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-3.12.61-52.101.1.noarch",
                "product": {
                  "name": "kernel-macros-3.12.61-52.101.1.noarch",
                  "product_id": "kernel-macros-3.12.61-52.101.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-3.12.61-52.101.1.noarch",
                "product": {
                  "name": "kernel-source-3.12.61-52.101.1.noarch",
                  "product_id": "kernel-source-3.12.61-52.101.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-3.12.61-52.101.1.ppc64le",
                "product": {
                  "name": "kernel-default-3.12.61-52.101.1.ppc64le",
                  "product_id": "kernel-default-3.12.61-52.101.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.12.61-52.101.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-3.12.61-52.101.1.ppc64le",
                  "product_id": "kernel-default-base-3.12.61-52.101.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.12.61-52.101.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-3.12.61-52.101.1.ppc64le",
                  "product_id": "kernel-default-devel-3.12.61-52.101.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.12.61-52.101.1.ppc64le",
                "product": {
                  "name": "kernel-syms-3.12.61-52.101.1.ppc64le",
                  "product_id": "kernel-syms-3.12.61-52.101.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-3.12.61-52.101.1.s390x",
                "product": {
                  "name": "kernel-default-3.12.61-52.101.1.s390x",
                  "product_id": "kernel-default-3.12.61-52.101.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.12.61-52.101.1.s390x",
                "product": {
                  "name": "kernel-default-base-3.12.61-52.101.1.s390x",
                  "product_id": "kernel-default-base-3.12.61-52.101.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.12.61-52.101.1.s390x",
                "product": {
                  "name": "kernel-default-devel-3.12.61-52.101.1.s390x",
                  "product_id": "kernel-default-devel-3.12.61-52.101.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-3.12.61-52.101.1.s390x",
                "product": {
                  "name": "kernel-default-man-3.12.61-52.101.1.s390x",
                  "product_id": "kernel-default-man-3.12.61-52.101.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.12.61-52.101.1.s390x",
                "product": {
                  "name": "kernel-syms-3.12.61-52.101.1.s390x",
                  "product_id": "kernel-syms-3.12.61-52.101.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-ec2-3.12.61-52.101.1.x86_64",
                "product": {
                  "name": "kernel-ec2-3.12.61-52.101.1.x86_64",
                  "product_id": "kernel-ec2-3.12.61-52.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-devel-3.12.61-52.101.1.x86_64",
                "product": {
                  "name": "kernel-ec2-devel-3.12.61-52.101.1.x86_64",
                  "product_id": "kernel-ec2-devel-3.12.61-52.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-extra-3.12.61-52.101.1.x86_64",
                "product": {
                  "name": "kernel-ec2-extra-3.12.61-52.101.1.x86_64",
                  "product_id": "kernel-ec2-extra-3.12.61-52.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-3.12.61-52.101.1.x86_64",
                "product": {
                  "name": "kernel-default-3.12.61-52.101.1.x86_64",
                  "product_id": "kernel-default-3.12.61-52.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.12.61-52.101.1.x86_64",
                "product": {
                  "name": "kernel-default-base-3.12.61-52.101.1.x86_64",
                  "product_id": "kernel-default-base-3.12.61-52.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.12.61-52.101.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-3.12.61-52.101.1.x86_64",
                  "product_id": "kernel-default-devel-3.12.61-52.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.12.61-52.101.1.x86_64",
                "product": {
                  "name": "kernel-syms-3.12.61-52.101.1.x86_64",
                  "product_id": "kernel-syms-3.12.61-52.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-3.12.61-52.101.1.x86_64",
                "product": {
                  "name": "kernel-xen-3.12.61-52.101.1.x86_64",
                  "product_id": "kernel-xen-3.12.61-52.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-base-3.12.61-52.101.1.x86_64",
                "product": {
                  "name": "kernel-xen-base-3.12.61-52.101.1.x86_64",
                  "product_id": "kernel-xen-base-3.12.61-52.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-3.12.61-52.101.1.x86_64",
                "product": {
                  "name": "kernel-xen-devel-3.12.61-52.101.1.x86_64",
                  "product_id": "kernel-xen-devel-3.12.61-52.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
                "product": {
                  "name": "kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
                  "product_id": "kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64",
                "product": {
                  "name": "kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64",
                  "product_id": "kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 12",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 12",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:12"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-3.12.61-52.101.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64"
        },
        "product_reference": "kernel-ec2-3.12.61-52.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-devel-3.12.61-52.101.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64"
        },
        "product_reference": "kernel-ec2-devel-3.12.61-52.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-extra-3.12.61-52.101.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64"
        },
        "product_reference": "kernel-ec2-extra-3.12.61-52.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.61-52.101.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le"
        },
        "product_reference": "kernel-default-3.12.61-52.101.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.61-52.101.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x"
        },
        "product_reference": "kernel-default-3.12.61-52.101.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.12.61-52.101.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64"
        },
        "product_reference": "kernel-default-3.12.61-52.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.61-52.101.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le"
        },
        "product_reference": "kernel-default-base-3.12.61-52.101.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.61-52.101.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x"
        },
        "product_reference": "kernel-default-base-3.12.61-52.101.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.12.61-52.101.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64"
        },
        "product_reference": "kernel-default-base-3.12.61-52.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.61-52.101.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-3.12.61-52.101.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.61-52.101.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x"
        },
        "product_reference": "kernel-default-devel-3.12.61-52.101.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.12.61-52.101.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64"
        },
        "product_reference": "kernel-default-devel-3.12.61-52.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-3.12.61-52.101.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x"
        },
        "product_reference": "kernel-default-man-3.12.61-52.101.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-3.12.61-52.101.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch"
        },
        "product_reference": "kernel-devel-3.12.61-52.101.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-3.12.61-52.101.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch"
        },
        "product_reference": "kernel-macros-3.12.61-52.101.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.12.61-52.101.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch"
        },
        "product_reference": "kernel-source-3.12.61-52.101.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.61-52.101.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le"
        },
        "product_reference": "kernel-syms-3.12.61-52.101.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.61-52.101.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x"
        },
        "product_reference": "kernel-syms-3.12.61-52.101.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.12.61-52.101.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64"
        },
        "product_reference": "kernel-syms-3.12.61-52.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-3.12.61-52.101.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64"
        },
        "product_reference": "kernel-xen-3.12.61-52.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-base-3.12.61-52.101.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64"
        },
        "product_reference": "kernel-xen-base-3.12.61-52.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-3.12.61-52.101.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64"
        },
        "product_reference": "kernel-xen-devel-3.12.61-52.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64"
        },
        "product_reference": "kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        },
        "product_reference": "kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-9004",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-9004"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/events/core.c in the Linux kernel before 3.19 mishandles counter grouping, which allows local users to gain privileges via a crafted application, related to the perf_pmu_register and perf_event_open functions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-9004",
          "url": "https://www.suse.com/security/cve/CVE-2015-9004"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1037306 for CVE-2015-9004",
          "url": "https://bugzilla.suse.com/1037306"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2015-9004"
    },
    {
      "cve": "CVE-2016-10229",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-10229"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-10229",
          "url": "https://www.suse.com/security/cve/CVE-2016-10229"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1032268 for CVE-2016-10229",
          "url": "https://bugzilla.suse.com/1032268"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2016-10229"
    },
    {
      "cve": "CVE-2016-9604",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-9604"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as \u0027.dns_resolver\u0027 in RHEL-7 or \u0027.builtin_trusted_keys\u0027 upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-9604",
          "url": "https://www.suse.com/security/cve/CVE-2016-9604"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1035576 for CVE-2016-9604",
          "url": "https://bugzilla.suse.com/1035576"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-9604"
    },
    {
      "cve": "CVE-2017-1000363",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-1000363"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a \u0027secure boot\u0027 kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6\u0027s CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (\u003eLP_NO) \u0027lp=none\u0027 arguments to the command line.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-1000363",
          "url": "https://www.suse.com/security/cve/CVE-2017-1000363"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1039456 for CVE-2017-1000363",
          "url": "https://bugzilla.suse.com/1039456"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-1000363",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-1000363"
    },
    {
      "cve": "CVE-2017-1000365",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-1000365"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-1000365",
          "url": "https://www.suse.com/security/cve/CVE-2017-1000365"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1037551 for CVE-2017-1000365",
          "url": "https://bugzilla.suse.com/1037551"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1039346 for CVE-2017-1000365",
          "url": "https://bugzilla.suse.com/1039346"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1039349 for CVE-2017-1000365",
          "url": "https://bugzilla.suse.com/1039349"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1039354 for CVE-2017-1000365",
          "url": "https://bugzilla.suse.com/1039354"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1054557 for CVE-2017-1000365",
          "url": "https://bugzilla.suse.com/1054557"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1077345 for CVE-2017-1000365",
          "url": "https://bugzilla.suse.com/1077345"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-1000365"
    },
    {
      "cve": "CVE-2017-1000380",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-1000380"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-1000380",
          "url": "https://www.suse.com/security/cve/CVE-2017-1000380"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1044125 for CVE-2017-1000380",
          "url": "https://bugzilla.suse.com/1044125"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-1000380"
    },
    {
      "cve": "CVE-2017-10661",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-10661"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-10661",
          "url": "https://www.suse.com/security/cve/CVE-2017-10661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1053152 for CVE-2017-10661",
          "url": "https://bugzilla.suse.com/1053152"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1053153 for CVE-2017-10661",
          "url": "https://bugzilla.suse.com/1053153"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-10661",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-10661"
    },
    {
      "cve": "CVE-2017-11176",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-11176"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-11176",
          "url": "https://www.suse.com/security/cve/CVE-2017-11176"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1048275 for CVE-2017-11176",
          "url": "https://bugzilla.suse.com/1048275"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-11176",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-11176"
    },
    {
      "cve": "CVE-2017-12153",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-12153"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-12153",
          "url": "https://www.suse.com/security/cve/CVE-2017-12153"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1058410 for CVE-2017-12153",
          "url": "https://bugzilla.suse.com/1058410"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1058624 for CVE-2017-12153",
          "url": "https://bugzilla.suse.com/1058624"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-12153"
    },
    {
      "cve": "CVE-2017-12154",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-12154"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the \"CR8-load exiting\" and \"CR8-store exiting\" L0 vmcs02 controls exist in cases where L1 omits the \"use TPR shadow\" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-12154",
          "url": "https://www.suse.com/security/cve/CVE-2017-12154"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1058038 for CVE-2017-12154",
          "url": "https://bugzilla.suse.com/1058038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1058507 for CVE-2017-12154",
          "url": "https://bugzilla.suse.com/1058507"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-12154"
    },
    {
      "cve": "CVE-2017-12762",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-12762"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stable tree, and 4.4-stable tree.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-12762",
          "url": "https://www.suse.com/security/cve/CVE-2017-12762"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1053148 for CVE-2017-12762",
          "url": "https://bugzilla.suse.com/1053148"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1053150 for CVE-2017-12762",
          "url": "https://bugzilla.suse.com/1053150"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1072117 for CVE-2017-12762",
          "url": "https://bugzilla.suse.com/1072117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1072162 for CVE-2017-12762",
          "url": "https://bugzilla.suse.com/1072162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-12762",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-12762"
    },
    {
      "cve": "CVE-2017-13080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-13080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-13080",
          "url": "https://www.suse.com/security/cve/CVE-2017-13080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1056061 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1056061"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1063479 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1063479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1063667 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1063667"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1063671 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1063671"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1066295 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1066295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1105108 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1105108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178872 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1178872"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179588 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1179588"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-13080"
    },
    {
      "cve": "CVE-2017-14051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-14051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-14051",
          "url": "https://www.suse.com/security/cve/CVE-2017-14051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1056588 for CVE-2017-14051",
          "url": "https://bugzilla.suse.com/1056588"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-14051"
    },
    {
      "cve": "CVE-2017-14106",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-14106"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-14106",
          "url": "https://www.suse.com/security/cve/CVE-2017-14106"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1056982 for CVE-2017-14106",
          "url": "https://bugzilla.suse.com/1056982"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-14106"
    },
    {
      "cve": "CVE-2017-14140",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-14140"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn\u0027t check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-14140",
          "url": "https://www.suse.com/security/cve/CVE-2017-14140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1057179 for CVE-2017-14140",
          "url": "https://bugzilla.suse.com/1057179"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-14140"
    },
    {
      "cve": "CVE-2017-15265",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-15265"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-15265",
          "url": "https://www.suse.com/security/cve/CVE-2017-15265"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1062520 for CVE-2017-15265",
          "url": "https://bugzilla.suse.com/1062520"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-15265",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-15265"
    },
    {
      "cve": "CVE-2017-15274",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-15274"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-15274",
          "url": "https://www.suse.com/security/cve/CVE-2017-15274"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1045327 for CVE-2017-15274",
          "url": "https://bugzilla.suse.com/1045327"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1062471 for CVE-2017-15274",
          "url": "https://bugzilla.suse.com/1062471"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-15274"
    },
    {
      "cve": "CVE-2017-15649",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-15649"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-15649",
          "url": "https://www.suse.com/security/cve/CVE-2017-15649"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1064388 for CVE-2017-15649",
          "url": "https://bugzilla.suse.com/1064388"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1064392 for CVE-2017-15649",
          "url": "https://bugzilla.suse.com/1064392"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-15649",
          "url": "https://bugzilla.suse.com/1087082"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-15649"
    },
    {
      "cve": "CVE-2017-2647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-2647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-2647",
          "url": "https://www.suse.com/security/cve/CVE-2017-2647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1030593 for CVE-2017-2647",
          "url": "https://bugzilla.suse.com/1030593"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-2647",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-2647"
    },
    {
      "cve": "CVE-2017-6951",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-6951"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the \"dead\" type.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-6951",
          "url": "https://www.suse.com/security/cve/CVE-2017-6951"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1029850 for CVE-2017-6951",
          "url": "https://bugzilla.suse.com/1029850"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1030593 for CVE-2017-6951",
          "url": "https://bugzilla.suse.com/1030593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-6951"
    },
    {
      "cve": "CVE-2017-7482",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7482"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7482",
          "url": "https://www.suse.com/security/cve/CVE-2017-7482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1046107 for CVE-2017-7482",
          "url": "https://bugzilla.suse.com/1046107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-7482",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-7482"
    },
    {
      "cve": "CVE-2017-7487",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7487"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7487",
          "url": "https://www.suse.com/security/cve/CVE-2017-7487"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038879 for CVE-2017-7487",
          "url": "https://bugzilla.suse.com/1038879"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038883 for CVE-2017-7487",
          "url": "https://bugzilla.suse.com/1038883"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038981 for CVE-2017-7487",
          "url": "https://bugzilla.suse.com/1038981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038982 for CVE-2017-7487",
          "url": "https://bugzilla.suse.com/1038982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1072204 for CVE-2017-7487",
          "url": "https://bugzilla.suse.com/1072204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-7487",
          "url": "https://bugzilla.suse.com/1115893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 870618 for CVE-2017-7487",
          "url": "https://bugzilla.suse.com/870618"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-7487"
    },
    {
      "cve": "CVE-2017-7518",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7518"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7518",
          "url": "https://www.suse.com/security/cve/CVE-2017-7518"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1045922 for CVE-2017-7518",
          "url": "https://bugzilla.suse.com/1045922"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-7518",
          "url": "https://bugzilla.suse.com/1087082"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-7518"
    },
    {
      "cve": "CVE-2017-7541",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7541"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7541",
          "url": "https://www.suse.com/security/cve/CVE-2017-7541"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1049645 for CVE-2017-7541",
          "url": "https://bugzilla.suse.com/1049645"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-7541"
    },
    {
      "cve": "CVE-2017-7542",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7542"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7542",
          "url": "https://www.suse.com/security/cve/CVE-2017-7542"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1049882 for CVE-2017-7542",
          "url": "https://bugzilla.suse.com/1049882"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1061936 for CVE-2017-7542",
          "url": "https://bugzilla.suse.com/1061936"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-7542"
    },
    {
      "cve": "CVE-2017-7889",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7889"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7889",
          "url": "https://www.suse.com/security/cve/CVE-2017-7889"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1034405 for CVE-2017-7889",
          "url": "https://bugzilla.suse.com/1034405"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-7889"
    },
    {
      "cve": "CVE-2017-8106",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-8106"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-8106",
          "url": "https://www.suse.com/security/cve/CVE-2017-8106"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1035877 for CVE-2017-8106",
          "url": "https://bugzilla.suse.com/1035877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-8106"
    },
    {
      "cve": "CVE-2017-8831",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-8831"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-8831",
          "url": "https://www.suse.com/security/cve/CVE-2017-8831"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1037994 for CVE-2017-8831",
          "url": "https://bugzilla.suse.com/1037994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1061936 for CVE-2017-8831",
          "url": "https://bugzilla.suse.com/1061936"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-8831",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-8831",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-8831"
    },
    {
      "cve": "CVE-2017-8890",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-8890"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-8890",
          "url": "https://www.suse.com/security/cve/CVE-2017-8890"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038544 for CVE-2017-8890",
          "url": "https://bugzilla.suse.com/1038544"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038564 for CVE-2017-8890",
          "url": "https://bugzilla.suse.com/1038564"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1039883 for CVE-2017-8890",
          "url": "https://bugzilla.suse.com/1039883"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1039885 for CVE-2017-8890",
          "url": "https://bugzilla.suse.com/1039885"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1040069 for CVE-2017-8890",
          "url": "https://bugzilla.suse.com/1040069"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042364 for CVE-2017-8890",
          "url": "https://bugzilla.suse.com/1042364"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1051906 for CVE-2017-8890",
          "url": "https://bugzilla.suse.com/1051906"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-8890",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-8890"
    },
    {
      "cve": "CVE-2017-8924",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-8924"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel before 4.10.4 allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-8924",
          "url": "https://www.suse.com/security/cve/CVE-2017-8924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1037182 for CVE-2017-8924",
          "url": "https://bugzilla.suse.com/1037182"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038981 for CVE-2017-8924",
          "url": "https://bugzilla.suse.com/1038981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038982 for CVE-2017-8924",
          "url": "https://bugzilla.suse.com/1038982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 870618 for CVE-2017-8924",
          "url": "https://bugzilla.suse.com/870618"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-8924"
    },
    {
      "cve": "CVE-2017-8925",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-8925"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-8925",
          "url": "https://www.suse.com/security/cve/CVE-2017-8925"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1037183 for CVE-2017-8925",
          "url": "https://bugzilla.suse.com/1037183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038981 for CVE-2017-8925",
          "url": "https://bugzilla.suse.com/1038981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038982 for CVE-2017-8925",
          "url": "https://bugzilla.suse.com/1038982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 870618 for CVE-2017-8925",
          "url": "https://bugzilla.suse.com/870618"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-8925"
    },
    {
      "cve": "CVE-2017-9074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-9074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-9074",
          "url": "https://www.suse.com/security/cve/CVE-2017-9074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1039882 for CVE-2017-9074",
          "url": "https://bugzilla.suse.com/1039882"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-9074",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-9074"
    },
    {
      "cve": "CVE-2017-9075",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-9075"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-9075",
          "url": "https://www.suse.com/security/cve/CVE-2017-9075"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038544 for CVE-2017-9075",
          "url": "https://bugzilla.suse.com/1038544"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1039883 for CVE-2017-9075",
          "url": "https://bugzilla.suse.com/1039883"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1051906 for CVE-2017-9075",
          "url": "https://bugzilla.suse.com/1051906"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-9075",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-9075"
    },
    {
      "cve": "CVE-2017-9076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-9076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-9076",
          "url": "https://www.suse.com/security/cve/CVE-2017-9076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038544 for CVE-2017-9076",
          "url": "https://bugzilla.suse.com/1038544"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1039885 for CVE-2017-9076",
          "url": "https://bugzilla.suse.com/1039885"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1040069 for CVE-2017-9076",
          "url": "https://bugzilla.suse.com/1040069"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1051906 for CVE-2017-9076",
          "url": "https://bugzilla.suse.com/1051906"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-9076",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-9076"
    },
    {
      "cve": "CVE-2017-9077",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-9077"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-9077",
          "url": "https://www.suse.com/security/cve/CVE-2017-9077"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1038544 for CVE-2017-9077",
          "url": "https://bugzilla.suse.com/1038544"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1040069 for CVE-2017-9077",
          "url": "https://bugzilla.suse.com/1040069"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042364 for CVE-2017-9077",
          "url": "https://bugzilla.suse.com/1042364"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-9077",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-9077"
    },
    {
      "cve": "CVE-2017-9242",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-9242"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-9242",
          "url": "https://www.suse.com/security/cve/CVE-2017-9242"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1041431 for CVE-2017-9242",
          "url": "https://bugzilla.suse.com/1041431"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042892 for CVE-2017-9242",
          "url": "https://bugzilla.suse.com/1042892"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.101.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.101.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-1-8.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-1-8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-11-02T13:02:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-9242"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…