Bugzilla – Bug 1013604
VUL-0: CVE-2016-9576: kernel: Use-after-free in SCSI Generic driver
Last modified: 2019-05-01 12:51:39 UTC
It is possible to trigger a use-after-free bug in the Linux Kernel's SCSI generic driver with the program from [1]. The corresponding upstream report is in [2]. [1] https://gist.githubusercontent.com/dvyukov/80cd94b4e4c288f16ee4c787d404118b/raw/10536069562444da51b758bb39655b514ff93b45/gistfile1.txt [2] http://www.spinics.net/lists/linux-scsi/msg102232.html
Created attachment 704782 [details] dmesg and trace buffer from test run dmesg and trace buffer from test run with a trace_printk() augmented kernel.
In the trace data from comment 1 the faulting address was equal to the dxferp from the SCSI generic header. In other tests I've ran it was dxferp + offset with offset always being a) smaller than dxferp + dxfer_len and b) always a multiple of 0x1000.
(seems security relevant)
affects all kernels down to 2.6.
cve/linux-2.6.16 is unaffected. cve/linux-2.6.32 is and all newer branches are affected.
Created attachment 705341 [details] gistfile1.txt gistfile1.txt
Created attachment 705342 [details] FMODE based patch Patch suggested by Al Viro and sent to Al and Linus for review.
As a side note: The splice() system call, which enables the creative abuse of the sg and bsg drivers, was introduced with kernel 2.6.17.
Created attachment 705446 [details] Don't feed anything but regular iovec's to blk_rq_map_user_iov Linus' patch for 4.9 fixing the issue (already applied mainline as commit a0ac402cf)
Can I start backporting the fix to these kernel's even without an official CVE number available yet?
can you start backporting it to our kernels ... We will need to add the CVE reference later on.
CVE-2016-9576
The linux-distros team urged me to make it public asap, as it is upstream known, and so i did. - issue is public please apply to all branches.
Linus' fix committed to: - master - stable - openSUSE-42.1 - SLES12-SP2 Older branches aren't fixable using Linus' fix. I'll backport my FMODE based fix instead.
Created attachment 705827 [details] splice: introduce FMODE_SPLICE_READ and FMODE_SPLICE_WRITE Version I've sent upstream
Branches which received my fix are: - openSUSE-13.2 - cve/linux-3.0 - cve/linux-3.12 - cve/linux-2.6.32
All applicable branches pushed. Back to security.
This is an autogenerated message for OBS integration: This bug (1013604) was mentioned in https://build.opensuse.org/request/show/445180 42.1 / kernel-source https://build.opensuse.org/request/show/445181 42.2 / kernel-source
openSUSE-SU-2016:3085-1: An update that solves one vulnerability and has 7 fixes is now available. Category: security (important) Bug References: 1003606,1006827,1008557,1011913,1013001,1013604,1014120,981825 CVE References: CVE-2016-9576 Sources used: openSUSE Leap 42.2 (src): kernel-debug-4.4.36-8.1, kernel-default-4.4.36-8.1, kernel-docs-4.4.36-8.2, kernel-obs-build-4.4.36-8.1, kernel-obs-qa-4.4.36-8.1, kernel-source-4.4.36-8.1, kernel-syms-4.4.36-8.1, kernel-vanilla-4.4.36-8.1
openSUSE-SU-2016:3086-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1013604 CVE References: CVE-2016-9576 Sources used: openSUSE Leap 42.1 (src): kernel-debug-4.1.36-41.1, kernel-default-4.1.36-41.1, kernel-docs-4.1.36-41.2, kernel-ec2-4.1.36-41.1, kernel-obs-build-4.1.36-41.1, kernel-obs-qa-4.1.36-41.1, kernel-pae-4.1.36-41.1, kernel-pv-4.1.36-41.1, kernel-source-4.1.36-41.1, kernel-syms-4.1.36-41.1, kernel-vanilla-4.1.36-41.1, kernel-xen-4.1.36-41.1
openSUSE-SU-2016:3118-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1013533,1013604 CVE References: CVE-2016-9576,CVE-2016-9794 Sources used: openSUSE 13.1 (src): cloop-2.639-11.40.1, crash-7.0.2-2.40.1, hdjmod-1.28-16.40.1, ipset-6.21.1-2.44.1, iscsitarget-1.4.20.3-13.40.1, kernel-debug-3.12.67-64.1, kernel-default-3.12.67-64.1, kernel-desktop-3.12.67-64.1, kernel-docs-3.12.67-64.2, kernel-ec2-3.12.67-64.1, kernel-pae-3.12.67-64.1, kernel-source-3.12.67-64.1, kernel-syms-3.12.67-64.1, kernel-trace-3.12.67-64.1, kernel-vanilla-3.12.67-64.1, kernel-xen-3.12.67-64.1, ndiswrapper-1.58-41.1, openvswitch-1.11.0-0.47.1, pcfclock-0.44-258.41.1, vhba-kmp-20130607-2.40.1, virtualbox-4.2.36-2.72.1, xen-4.3.4_10-73.1, xtables-addons-2.3-2.39.1
SUSE-SU-2016:3146-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1013533,1013604 CVE References: CVE-2016-9576,CVE-2016-9794 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP2 (src): kernel-default-4.4.21-90.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): kernel-docs-4.4.21-90.3, kernel-obs-build-4.4.21-90.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): kernel-default-4.4.21-90.1, kernel-source-4.4.21-90.1, kernel-syms-4.4.21-90.1 SUSE Linux Enterprise Server 12-SP2 (src): kernel-default-4.4.21-90.1, kernel-source-4.4.21-90.1, kernel-syms-4.4.21-90.1 SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP2_Update_3-1-2.3 SUSE Linux Enterprise High Availability 12-SP2 (src): kernel-default-4.4.21-90.1 SUSE Linux Enterprise Desktop 12-SP2 (src): kernel-default-4.4.21-90.1, kernel-source-4.4.21-90.1, kernel-syms-4.4.21-90.1
SUSE-SU-2016:3188-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1013533,1013604 CVE References: CVE-2016-9576,CVE-2016-9794 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP1 (src): kernel-default-3.12.67-60.64.24.1 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): kernel-docs-3.12.67-60.64.24.3, kernel-obs-build-3.12.67-60.64.24.1 SUSE Linux Enterprise Server 12-SP1 (src): kernel-default-3.12.67-60.64.24.1, kernel-source-3.12.67-60.64.24.1, kernel-syms-3.12.67-60.64.24.1, kernel-xen-3.12.67-60.64.24.1 SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-ec2-3.12.67-60.64.24.1 SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP1_Update_11-1-2.1 SUSE Linux Enterprise Desktop 12-SP1 (src): kernel-default-3.12.67-60.64.24.1, kernel-source-3.12.67-60.64.24.1, kernel-syms-3.12.67-60.64.24.1, kernel-xen-3.12.67-60.64.24.1
SUSE-SU-2016:3203-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1013533,1013604 CVE References: CVE-2016-9576,CVE-2016-9794 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): kernel-docs-3.0.101-91.2 SUSE Linux Enterprise Server 11-SP4 (src): kernel-bigmem-3.0.101-91.1, kernel-default-3.0.101-91.1, kernel-ec2-3.0.101-91.1, kernel-pae-3.0.101-91.1, kernel-ppc64-3.0.101-91.1, kernel-source-3.0.101-91.1, kernel-syms-3.0.101-91.1, kernel-trace-3.0.101-91.1, kernel-xen-3.0.101-91.1 SUSE Linux Enterprise Server 11-EXTRA (src): kernel-default-3.0.101-91.1, kernel-pae-3.0.101-91.1, kernel-ppc64-3.0.101-91.1, kernel-trace-3.0.101-91.1, kernel-xen-3.0.101-91.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): kernel-bigmem-3.0.101-91.1, kernel-default-3.0.101-91.1, kernel-ec2-3.0.101-91.1, kernel-pae-3.0.101-91.1, kernel-ppc64-3.0.101-91.1, kernel-trace-3.0.101-91.1, kernel-xen-3.0.101-91.1
SUSE-SU-2016:3217-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1013533,1013604 CVE References: CVE-2016-9576,CVE-2016-9794 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): kernel-default-3.12.60-52.63.1, kernel-source-3.12.60-52.63.1, kernel-syms-3.12.60-52.63.1, kernel-xen-3.12.60-52.63.1, kgraft-patch-SLE12_Update_18-1-2.1 SUSE Linux Enterprise Server 12-LTSS (src): kernel-default-3.12.60-52.63.1, kernel-source-3.12.60-52.63.1, kernel-syms-3.12.60-52.63.1, kernel-xen-3.12.60-52.63.1, kgraft-patch-SLE12_Update_18-1-2.1 SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-ec2-3.12.60-52.63.1
SUSE-SU-2016:3248-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1013533,1013604 CVE References: CVE-2016-9576,CVE-2016-9794 Sources used: SUSE OpenStack Cloud 5 (src): kernel-bigsmp-3.0.101-0.47.93.1, kernel-default-3.0.101-0.47.93.1, kernel-ec2-3.0.101-0.47.93.1, kernel-source-3.0.101-0.47.93.1, kernel-syms-3.0.101-0.47.93.1, kernel-trace-3.0.101-0.47.93.1, kernel-xen-3.0.101-0.47.93.1 SUSE Manager Proxy 2.1 (src): kernel-bigsmp-3.0.101-0.47.93.1, kernel-default-3.0.101-0.47.93.1, kernel-ec2-3.0.101-0.47.93.1, kernel-source-3.0.101-0.47.93.1, kernel-syms-3.0.101-0.47.93.1, kernel-trace-3.0.101-0.47.93.1, kernel-xen-3.0.101-0.47.93.1 SUSE Manager 2.1 (src): kernel-bigsmp-3.0.101-0.47.93.1, kernel-default-3.0.101-0.47.93.1, kernel-ec2-3.0.101-0.47.93.1, kernel-source-3.0.101-0.47.93.1, kernel-syms-3.0.101-0.47.93.1, kernel-trace-3.0.101-0.47.93.1, kernel-xen-3.0.101-0.47.93.1 SUSE Linux Enterprise Server 11-SP3-LTSS (src): kernel-bigsmp-3.0.101-0.47.93.1, kernel-default-3.0.101-0.47.93.1, kernel-ec2-3.0.101-0.47.93.1, kernel-pae-3.0.101-0.47.93.1, kernel-source-3.0.101-0.47.93.1, kernel-syms-3.0.101-0.47.93.1, kernel-trace-3.0.101-0.47.93.1, kernel-xen-3.0.101-0.47.93.1 SUSE Linux Enterprise Server 11-EXTRA (src): kernel-bigsmp-3.0.101-0.47.93.1, kernel-default-3.0.101-0.47.93.1, kernel-pae-3.0.101-0.47.93.1, kernel-ppc64-3.0.101-0.47.93.1, kernel-trace-3.0.101-0.47.93.1, kernel-xen-3.0.101-0.47.93.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): kernel-default-3.0.101-0.47.93.1, kernel-ec2-3.0.101-0.47.93.1, kernel-pae-3.0.101-0.47.93.1, kernel-source-3.0.101-0.47.93.1, kernel-syms-3.0.101-0.47.93.1, kernel-trace-3.0.101-0.47.93.1, kernel-xen-3.0.101-0.47.93.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): kernel-bigsmp-3.0.101-0.47.93.1, kernel-default-3.0.101-0.47.93.1, kernel-ec2-3.0.101-0.47.93.1, kernel-pae-3.0.101-0.47.93.1, kernel-trace-3.0.101-0.47.93.1, kernel-xen-3.0.101-0.47.93.1
SUSE-SU-2016:3252-1: An update that fixes two vulnerabilities is now available. Category: security (important) Bug References: 1013533,1013604 CVE References: CVE-2016-9576,CVE-2016-9794 Sources used: SUSE Linux Enterprise Server 11-SP2-LTSS (src): kernel-default-3.0.101-0.7.47.1, kernel-ec2-3.0.101-0.7.47.1, kernel-pae-3.0.101-0.7.47.1, kernel-source-3.0.101-0.7.47.1, kernel-syms-3.0.101-0.7.47.1, kernel-trace-3.0.101-0.7.47.1, kernel-xen-3.0.101-0.7.47.1 SUSE Linux Enterprise Debuginfo 11-SP2 (src): kernel-default-3.0.101-0.7.47.1, kernel-ec2-3.0.101-0.7.47.1, kernel-pae-3.0.101-0.7.47.1, kernel-trace-3.0.101-0.7.47.1, kernel-xen-3.0.101-0.7.47.1
released
SUSE-SU-2017:0226-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794 Sources used: SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP1_Update_7-5-2.1
SUSE-SU-2017:0229-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794 Sources used: SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP1_Update_9-3-2.1
SUSE-SU-2017:0230-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271,1017589 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP1_Update_6-6-2.1
SUSE-SU-2017:0231-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271,1017589 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP1_Update_2-8-2.1
SUSE-SU-2017:0233-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271,1017589 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP1_Update_3-7-2.1
SUSE-SU-2017:0234-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271,1017589 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP1_Update_4-6-2.1
SUSE-SU-2017:0235-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271,1017589 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP1_Update_5-6-2.1
SUSE-SU-2017:0244-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271,1017589 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): kgraft-patch-SLE12_Update_12-5-2.1 SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_12-5-2.1
SUSE-SU-2017:0245-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271,1017589 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): kgraft-patch-SLE12_Update_16-3-2.1 SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_16-3-2.1
SUSE-SU-2017:0246-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271,1017589 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): kgraft-patch-SLE12_Update_15-5-2.1 SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_15-5-2.1
SUSE-SU-2017:0247-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271,1017589 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): kgraft-patch-SLE12_Update_10-8-2.1 SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_10-8-2.1
SUSE-SU-2017:0248-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271,1017589 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): kgraft-patch-SLE12_Update_14-5-2.1 SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_14-5-2.1
SUSE-SU-2017:0249-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271,1017589 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): kgraft-patch-SLE12_Update_13-5-2.1 SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_13-5-2.1
SUSE-SU-2017:0267-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1013543,1013604,1014271,1017589 CVE References: CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): kgraft-patch-SLE12_Update_17-2-2.1 SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_17-2-2.1
SUSE-SU-2017:0268-1: An update that solves four vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271,1017589 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794,CVE-2016-9806 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): kgraft-patch-SLE12_Update_11-7-2.1 SUSE Linux Enterprise Server 12-LTSS (src): kgraft-patch-SLE12_Update_11-7-2.1
SUSE-SU-2017:0278-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1012852,1013543,1013604,1014271 CVE References: CVE-2016-8632,CVE-2016-9576,CVE-2016-9794 Sources used: SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP1_Update_8-4-2.1
SUSE-SU-2017:0294-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1013543,1013604,1014271 CVE References: CVE-2016-9576,CVE-2016-9794 Sources used: SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP1_Update_10-2-2.1
As per comment #5 kernel 2.6.32 is affected. Requesting PTF for SLES11SP1.
(In reply to Haral Tsitsivas from comment #51) > As per comment #5 kernel 2.6.32 is affected. > Requesting PTF for SLES11SP1. Same request for CVE-2016-9794 which is part of this patch.
(In reply to Haral Tsitsivas from comment #52) > (In reply to Haral Tsitsivas from comment #51) > > As per comment #5 kernel 2.6.32 is affected. > > Requesting PTF for SLES11SP1. > > Same request for CVE-2016-9794 which is part of this patch. please open a new Bugzilla for this request
SUSE-SU-2017:0407-1: An update that solves 24 vulnerabilities and has 56 fixes is now available. Category: security (important) Bug References: 1003813,1005666,1007197,1008557,1008567,1008831,1008833,1008876,1008979,1009062,1009969,1010040,1010213,1010294,1010475,1010478,1010501,1010502,1010507,1010612,1010711,1010716,1011685,1012060,1012422,1012754,1012917,1012985,1013001,1013038,1013479,1013531,1013533,1013540,1013604,1014410,1014746,1016713,1016725,1016961,1017164,1017170,1017410,1017710,1018100,1019032,1019148,1019260,1019300,1019783,1019851,1020214,1020602,1021258,856380,857394,858727,921338,921778,922052,922056,923036,923037,924381,938963,972993,980560,981709,983087,983348,984194,984419,985850,987192,987576,990384,991273,993739,997807,999101 CVE References: CVE-2015-8962,CVE-2015-8963,CVE-2015-8964,CVE-2016-10088,CVE-2016-7910,CVE-2016-7911,CVE-2016-7913,CVE-2016-7914,CVE-2016-8399,CVE-2016-8632,CVE-2016-8633,CVE-2016-8645,CVE-2016-8655,CVE-2016-9083,CVE-2016-9084,CVE-2016-9555,CVE-2016-9576,CVE-2016-9756,CVE-2016-9793,CVE-2016-9794,CVE-2016-9806,CVE-2017-2583,CVE-2017-2584,CVE-2017-5551 Sources used: SUSE Linux Enterprise Real Time Extension 12-SP1 (src): kernel-compute-3.12.69-60.30.1, kernel-compute_debug-3.12.69-60.30.1, kernel-rt-3.12.69-60.30.1, kernel-rt_debug-3.12.69-60.30.1, kernel-source-rt-3.12.69-60.30.1, kernel-syms-rt-3.12.69-60.30.1
SUSE-SU-2017:1102-1: An update that solves 27 vulnerabilities and has 114 fixes is now available. Category: security (important) Bug References: 1003077,1003344,1003568,1003677,1003813,1003866,1003925,1004517,1004520,1005857,1005877,1005896,1005903,1006917,1006919,1007615,1007944,1008557,1008645,1008831,1008833,1008893,1009875,1010150,1010175,1010201,1010467,1010501,1010507,1010711,1010716,1011685,1011820,1012411,1012422,1012832,1012851,1012917,1013018,1013038,1013042,1013070,1013531,1013533,1013542,1013604,1014410,1014454,1014746,1015561,1015752,1015760,1015796,1015803,1015817,1015828,1015844,1015848,1015878,1015932,1016320,1016505,1016520,1016668,1016688,1016824,1016831,1017686,1017710,1019148,1019165,1019348,1019783,1020214,1021258,748806,763198,771065,786036,790588,795297,799133,800999,803320,821612,824171,851603,853052,860441,863873,865783,871728,901809,907611,908458,908684,909077,909350,909484,909491,909618,913387,914939,919382,922634,924708,925065,928138,929141,953233,956514,960689,961589,962846,963655,967716,968010,969340,973203,973691,979681,984194,986337,987333,987576,989152,989680,989764,989896,990245,992566,992991,993739,993832,995968,996541,996557,997401,998689,999101,999907 CVE References: CVE-2004-0230,CVE-2012-6704,CVE-2013-6368,CVE-2015-1350,CVE-2015-8956,CVE-2015-8962,CVE-2015-8964,CVE-2016-10088,CVE-2016-3841,CVE-2016-5696,CVE-2016-7042,CVE-2016-7097,CVE-2016-7117,CVE-2016-7910,CVE-2016-7911,CVE-2016-7916,CVE-2016-8399,CVE-2016-8632,CVE-2016-8633,CVE-2016-8646,CVE-2016-9555,CVE-2016-9576,CVE-2016-9685,CVE-2016-9756,CVE-2016-9793,CVE-2016-9794,CVE-2017-5551 Sources used: SUSE Linux Enterprise Real Time Extension 11-SP4 (src): kernel-rt-3.0.101.rt130-68.1, kernel-rt_trace-3.0.101.rt130-68.1, kernel-source-rt-3.0.101.rt130-68.1, kernel-syms-rt-3.0.101.rt130-68.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): kernel-rt-3.0.101.rt130-68.1, kernel-rt_debug-3.0.101.rt130-68.1, kernel-rt_trace-3.0.101.rt130-68.1
(In reply to gm chen from comment #57) > (In reply to Zhigang Gao from comment #56) > > Where is the PTF link of > > kernel-default-base-3.0.101-0.47.90.1.12144.2.PTF.1013604 ? > > Customer needs the debuginfo package of kernel > > 3.0.101-0.47.90.1.12144.2.PTF.1013604 > > hi Johannes Thumshirn Marcus Meissner > Please help to check where is the PTF link of > kernel-default-base-3.0.101-0.47.90.1.12144.2.PTF.1013604 > > thanks The SLES11SP3 ptf is here: https://ptf.suse.com/b27a428a0750dc195e58933ba4411674/sles11-sp3/12144/x86_64/20170106/