{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-docs":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 11 SP4","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"kernel-bigmem","purl":"pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"kernel-ec2","purl":"pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"kernel-pae","purl":"pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"kernel-ppc64","purl":"pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"kernel-trace","purl":"pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"kernel-xen","purl":"pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"kernel-bigmem","purl":"pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"kernel-ec2","purl":"pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"kernel-pae","purl":"pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"kernel-ppc64","purl":"pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"kernel-trace","purl":"pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-bigmem":"3.0.101-108.38.1","kernel-bigmem-base":"3.0.101-108.38.1","kernel-bigmem-devel":"3.0.101-108.38.1","kernel-default":"3.0.101-108.38.1","kernel-default-base":"3.0.101-108.38.1","kernel-default-devel":"3.0.101-108.38.1","kernel-default-man":"3.0.101-108.38.1","kernel-ec2":"3.0.101-108.38.1","kernel-ec2-base":"3.0.101-108.38.1","kernel-ec2-devel":"3.0.101-108.38.1","kernel-pae":"3.0.101-108.38.1","kernel-pae-base":"3.0.101-108.38.1","kernel-pae-devel":"3.0.101-108.38.1","kernel-ppc64":"3.0.101-108.38.1","kernel-ppc64-base":"3.0.101-108.38.1","kernel-ppc64-devel":"3.0.101-108.38.1","kernel-source":"3.0.101-108.38.1","kernel-syms":"3.0.101-108.38.1","kernel-trace":"3.0.101-108.38.1","kernel-trace-base":"3.0.101-108.38.1","kernel-trace-devel":"3.0.101-108.38.1","kernel-xen":"3.0.101-108.38.1","kernel-xen-base":"3.0.101-108.38.1","kernel-xen-devel":"3.0.101-108.38.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"kernel-xen","purl":"pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.38.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).\n\n  Enhancements and bugfixes over the previous fixes have been added to this kernel.\n\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).\n- CVE-2018-7566: There was a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bnc#1083483).\n- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).\n- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allowed local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).\n- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).\n- CVE-2017-18208: The madvise_willneed function in mm/madvise.c local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).\n- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).\n- CVE-2018-6927: The futex_requeue function in kernel/futex.c in the Linux kernel might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).\n- CVE-2017-16914: The 'stub_send_ret_submit()' function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).\n- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).\n- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).\n- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).\n- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).\n- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).\n\nThe following non-security bugs were fixed:\n\n- af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085513, LTC#165135).\n- cifs: fix buffer overflow in cifs_build_path_to_root() (bsc#1085113).\n- drm/mgag200: fix a test in mga_vga_mode_valid() (bsc#1087092).\n- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1013018).\n- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1013018).\n- ide-cd: workaround VMware ESXi cdrom emulation bug (bsc#1080813).\n- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).\n- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).\n- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).\n- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (git-fixes).\n- kabi: x86/kaiser: properly align trampoline stack.\n- keys: do not let add_key() update an uninstantiated key (bnc#1063416).\n- keys: prevent creating a different user's keyrings (bnc#1065999).\n- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).\n- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).\n- nfsv4: fix getacl head length estimation (git-fixes).\n- pci: Use function 0 VPD for identical functions, regular VPD for others (bnc#943786 git-fixes).\n- pipe: actually allow root to exceed the pipe buffer limits (git-fixes).\n- posix-timers: Protect posix clock array access against speculation (bnc#1081358).\n- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075088).\n- qeth: repair SBAL elements calculation (bnc#1085513, LTC#165484).\n- Revert 'USB: cdc-acm: fix broken runtime suspend' (bsc#1067912)\n- s390/qeth: fix underestimated count of buffer elements (bnc#1082091, LTC#164529).\n- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).\n- usbnet: Fix a race between usbnet_stop() and the BH (bsc#1083275).\n- x86-64: Move the 'user' vsyscall segment out of the data segment (bsc#1082424).\n- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).\n- x86/kaiser: properly align trampoline stack (bsc#1087260).\n- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).\n- xen/x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).\n- xen/x86/cpu: Check speculation control CPUID bit (bsc#1068032).\n- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).\n- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600).\n- xen/x86/cpu: Sync CPU feature flags late (bsc#1075994 bsc#1075091).\n- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).\n- xen/x86/kaiser: Move feature detection up (bsc#1068032).\n- xfs: check for buffer errors before waiting (bsc#1052943).\n- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n","id":"SUSE-SU-2018:1080-1","modified":"2018-04-25T13:27:56Z","published":"2018-04-25T13:27:56Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20181080-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010470"},{"type":"REPORT","url":"https://bugzilla.suse.com/1013018"},{"type":"REPORT","url":"https://bugzilla.suse.com/1039348"},{"type":"REPORT","url":"https://bugzilla.suse.com/1052943"},{"type":"REPORT","url":"https://bugzilla.suse.com/1062568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1062840"},{"type":"REPORT","url":"https://bugzilla.suse.com/1063416"},{"type":"REPORT","url":"https://bugzilla.suse.com/1063516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065600"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065999"},{"type":"REPORT","url":"https://bugzilla.suse.com/1067118"},{"type":"REPORT","url":"https://bugzilla.suse.com/1067912"},{"type":"REPORT","url":"https://bugzilla.suse.com/1068032"},{"type":"REPORT","url":"https://bugzilla.suse.com/1072689"},{"type":"REPORT","url":"https://bugzilla.suse.com/1072865"},{"type":"REPORT","url":"https://bugzilla.suse.com/1075088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1075091"},{"type":"REPORT","url":"https://bugzilla.suse.com/1075994"},{"type":"REPORT","url":"https://bugzilla.suse.com/1078669"},{"type":"REPORT","url":"https://bugzilla.suse.com/1078672"},{"type":"REPORT","url":"https://bugzilla.suse.com/1078673"},{"type":"REPORT","url":"https://bugzilla.suse.com/1078674"},{"type":"REPORT","url":"https://bugzilla.suse.com/1080464"},{"type":"REPORT","url":"https://bugzilla.suse.com/1080757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1080813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1081358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082091"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083242"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083275"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083494"},{"type":"REPORT","url":"https://bugzilla.suse.com/1084536"},{"type":"REPORT","url":"https://bugzilla.suse.com/1085113"},{"type":"REPORT","url":"https://bugzilla.suse.com/1085279"},{"type":"REPORT","url":"https://bugzilla.suse.com/1085331"},{"type":"REPORT","url":"https://bugzilla.suse.com/1085513"},{"type":"REPORT","url":"https://bugzilla.suse.com/1086162"},{"type":"REPORT","url":"https://bugzilla.suse.com/1087092"},{"type":"REPORT","url":"https://bugzilla.suse.com/1087260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1087762"},{"type":"REPORT","url":"https://bugzilla.suse.com/1088147"},{"type":"REPORT","url":"https://bugzilla.suse.com/1088260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1089608"},{"type":"REPORT","url":"https://bugzilla.suse.com/909077"},{"type":"REPORT","url":"https://bugzilla.suse.com/940776"},{"type":"REPORT","url":"https://bugzilla.suse.com/943786"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-5156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-0861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12190"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-13166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-16644"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-16911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-16912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-16913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-16914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-18203"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-18208"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5715"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-10087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-6927"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7566"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7757"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-8822"}],"related":["CVE-2015-5156","CVE-2016-7915","CVE-2017-0861","CVE-2017-12190","CVE-2017-13166","CVE-2017-16644","CVE-2017-16911","CVE-2017-16912","CVE-2017-16913","CVE-2017-16914","CVE-2017-18203","CVE-2017-18208","CVE-2017-5715","CVE-2018-10087","CVE-2018-6927","CVE-2018-7566","CVE-2018-7757","CVE-2018-8822"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2015-5156","CVE-2016-7915","CVE-2017-0861","CVE-2017-12190","CVE-2017-13166","CVE-2017-16644","CVE-2017-16911","CVE-2017-16912","CVE-2017-16913","CVE-2017-16914","CVE-2017-18203","CVE-2017-18208","CVE-2017-5715","CVE-2018-10087","CVE-2018-6927","CVE-2018-7566","CVE-2018-7757","CVE-2018-8822"]}