{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.21-84.1","kernel-default-devel":"4.4.21-84.1","kernel-default-extra":"4.4.21-84.1","kernel-devel":"4.4.21-84.1","kernel-macros":"4.4.21-84.1","kernel-source":"4.4.21-84.1","kernel-syms":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.21-84.1","kernel-default-devel":"4.4.21-84.1","kernel-default-extra":"4.4.21-84.1","kernel-devel":"4.4.21-84.1","kernel-macros":"4.4.21-84.1","kernel-source":"4.4.21-84.1","kernel-syms":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.21-84.1","kernel-default-devel":"4.4.21-84.1","kernel-default-extra":"4.4.21-84.1","kernel-devel":"4.4.21-84.1","kernel-macros":"4.4.21-84.1","kernel-source":"4.4.21-84.1","kernel-syms":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.4.21-84.1","cluster-network-kmp-default":"4.4.21-84.1","dlm-kmp-default":"4.4.21-84.1","gfs2-kmp-default":"4.4.21-84.1","ocfs2-kmp-default":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 12 SP2","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kgraft-patch-4_4_21-84-default":"1-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12","name":"kgraft-patch-SLE12-SP2_Update_2","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-2.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.21-84.1","kernel-default-base":"4.4.21-84.1","kernel-default-devel":"4.4.21-84.1","kernel-devel":"4.4.21-84.1","kernel-macros":"4.4.21-84.1","kernel-source":"4.4.21-84.1","kernel-syms":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.21-84.1","kernel-default-base":"4.4.21-84.1","kernel-default-devel":"4.4.21-84.1","kernel-devel":"4.4.21-84.1","kernel-macros":"4.4.21-84.1","kernel-source":"4.4.21-84.1","kernel-syms":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.21-84.1","kernel-default-base":"4.4.21-84.1","kernel-default-devel":"4.4.21-84.1","kernel-devel":"4.4.21-84.1","kernel-macros":"4.4.21-84.1","kernel-source":"4.4.21-84.1","kernel-syms":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"4.4.21-84.3","kernel-obs-build":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP2","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"4.4.21-84.3","kernel-obs-build":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP2","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.21-84.1","kernel-default-base":"4.4.21-84.1","kernel-default-devel":"4.4.21-84.1","kernel-default-man":"4.4.21-84.1","kernel-devel":"4.4.21-84.1","kernel-macros":"4.4.21-84.1","kernel-source":"4.4.21-84.1","kernel-syms":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.21-84.1","kernel-default-base":"4.4.21-84.1","kernel-default-devel":"4.4.21-84.1","kernel-default-man":"4.4.21-84.1","kernel-devel":"4.4.21-84.1","kernel-macros":"4.4.21-84.1","kernel-source":"4.4.21-84.1","kernel-syms":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.21-84.1","kernel-default-base":"4.4.21-84.1","kernel-default-devel":"4.4.21-84.1","kernel-default-man":"4.4.21-84.1","kernel-devel":"4.4.21-84.1","kernel-macros":"4.4.21-84.1","kernel-source":"4.4.21-84.1","kernel-syms":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.21-84.1","kernel-default-base":"4.4.21-84.1","kernel-default-devel":"4.4.21-84.1","kernel-default-man":"4.4.21-84.1","kernel-devel":"4.4.21-84.1","kernel-macros":"4.4.21-84.1","kernel-source":"4.4.21-84.1","kernel-syms":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.21-84.1","kernel-default-base":"4.4.21-84.1","kernel-default-devel":"4.4.21-84.1","kernel-default-man":"4.4.21-84.1","kernel-devel":"4.4.21-84.1","kernel-macros":"4.4.21-84.1","kernel-source":"4.4.21-84.1","kernel-syms":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.21-84.1","kernel-default-base":"4.4.21-84.1","kernel-default-devel":"4.4.21-84.1","kernel-default-man":"4.4.21-84.1","kernel-devel":"4.4.21-84.1","kernel-macros":"4.4.21-84.1","kernel-source":"4.4.21-84.1","kernel-syms":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-extra":"4.4.21-84.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 12 SP2","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.21-84.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise 12 SP2 kernel was updated to receive critical security fixes.\n\nThe following security bugs were fixed:\n\n- CVE-2016-8655: A race condition in the af_packet packet_set_ring\n  function could be used by local attackers to crash the kernel or gain\n  privileges (bsc#1012754).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in\n  the Linux kernel did not validate the relationship between the minimum\n  fragment length and the maximum packet size, which allowed local users to\n  gain privileges or cause a denial of service (heap-based buffer overflow)\n  by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in\n  the Linux kernel lacks chunk-length checking for the first chunk, which\n  allowed remote attackers to cause a denial of service (out-of-bounds slab\n  access) or possibly have unspecified other impact via crafted SCTP data\n  (bnc#1011685).\n\n","id":"SUSE-SU-2016:3049-1","modified":"2016-12-07T18:29:31Z","published":"2016-12-07T18:29:31Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20163049-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1008831"},{"type":"REPORT","url":"https://bugzilla.suse.com/1011685"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012754"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8632"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8655"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-9555"}],"related":["CVE-2016-8632","CVE-2016-8655","CVE-2016-9555"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2016-8632","CVE-2016-8655","CVE-2016-9555"]}